Agile Information Security Management in Software R&D



Similar documents
Cyber Security VTT and the Finnish Approach

Cyber Security solutions

AGILE SOFTWARE DEVELOPMENT: INTRODUCTION, CURRENT STATUS & FUTURE Pekka Abrahamsson Jyväskylä

Security Controls What Works. Southside Virginia Community College: Security Awareness

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Our Commitment to Information Security

IT Risk Management Era: Research Challenges and Best Practices. Eyal Adar, Founder & CEO Eyal@WhiteCyberKnight.com Chairman of the EU SRMI

Introduction to Cyber Security / Information Security

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

Information Security Management Systems

Preparing yourself for ISO/IEC

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

ISO Information Security Management Systems Foundation

(Instructor-led; 3 Days)

Governance and Management of Information Security

Security metrics to improve information security management

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

Security Standards BS7799 and ISO17799

The Next Generation of Security Leaders

Release: 1. ICA60308 Advanced Diploma of Information Technology (E-Security)

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

IT Governance: The benefits of an Information Security Management System

Certified Information Systems Auditor (CISA)

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17

Integrated Information Management Systems

[Selezionare la data] INNOVERY GROUP COMPANY PROFILE. [Digitare il sottotitolo del documento] * *

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5),

University of Pittsburgh Security Assessment Questionnaire (v1.5)

CISA TIMETABLE (4 DAYS)

INCO-TRUST. INCO-TRUST: to set up a co-operation framework based on mutual interests & capabilities! Canada US S. Korea Japan.

Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST

Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Key Considerations for Information Technology Governance. 900 Monroe NW Grand Rapids, MI (616)

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Cloud Security Trust Cisco to Protect Your Data

Bellevue University Cybersecurity Programs & Courses

Secure by design: taking a strategic approach to cybersecurity

Cyber Security - What Would a Breach Really Mean for your Business?

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Document Hierarchy of Information Security. Corporate Security Policy. Information Security Standard. General Directive(s) Specific Directive(s)

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013

Information Security Management

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

CESG Certification of Cyber Security Training Courses

Information Security Awareness Training

Benchmark of controls over IT activities Report. ABC Ltd

How small and medium-sized enterprises can formulate an information security management system

ISO 27002:2013 Version Change Summary

Third Party Security Requirements Policy

ensuring security the way how we do it

Beyond ISO Intel's Product Security Maturity Model (PSMM)

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

I. Introduction to Privacy: Common Principles and Approaches

Information Security is not an IT problem! Enterprise Risk & Security Management

Cybersecurity Definitions and Academic Landscape

An ITIL Perspective for Storage Resource Management

Introduction to Information Assurance. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems

Richard Gadsden Information Security Office Office of the CIO Information Services

Software Development: The Next Security Frontier

CTR System Report FISMA

Human Factors in Information Security

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Basic Concepts of Information Security

HP Cyber Security Control Cyber Insight & Defence

HEC Security & Compliance

Guideline for Roles & Responsibilities in Information Asset Management

Defending against modern cyber threats

Generic Aspects and Special Issues for High Speed Networks. Carsten Benecke, DFN-FWL, University of Hamburg

Transcription:

Agile Information Security Management in Software R&D Rational and WebSphere User Group Finland Seminar 29.01.2008 Reijo Savola Network and Information Security Research Coordinator VTT Technical Research Centre of Finland

Contents Information Security from the Perspective of Agility Some Information Security Challenges and Trends Security Assurance and Agile Security Development Conclusions 2

I Information Security from the Perspective of Agility

Business Rationale for Agile Adoption The better quality often increases security too! Source: prof. Pekka Abrahamsson / VTT 4

Change is the Only Certainty in Software Research & Development The production of Technical Specifications for a 3rd Generation Mobile System based on the evolved GSM core networks. Change management is very important from security point-of-view Source: prof. Pekka Abrahamsson / VTT 5

How Agile Can You Be? Size (# of personnel) Fact corner: Agile is not an absolute Concept. Source: prof. Pekka Abrahamsson / VTT Source: Boehm & Turner (2003) 6

Goal: Balanced Information Security SECURITY Desired / adequate level of security USABILITY AND PERFORMANCE COST EFFECTIVENESS 7

Proactive Security Solutions Have Most Impact! Maturity of technology Design vulnerabilities Implementation vulnerabilities R &D Products and maintenance THE LEAST IMPACT (only emergency patches ) Research THE MOST IMPACT (development of new architectures, new technologies) Time 8

Introduction The Horizontal Nature of Information Security Telecom engineers: security is protocols, cryptography, key exchange techniques Software engineers: security means secure SW architectures Content providers: security is DRM IT department: security means proxies, firewalls and audits and if really needed, security policies Lawyers: security means how you conform to privacy legislation Process addicts: security is a business process Managers: security is OK, but it cannot cost anything Quality people: security is realized as one or more quality attributes, the meaning of which can be described in an ontology Written definition everywhere : security is confidentiality, integrity, availability, non-repudiation, authentication 9

Security vs. Agility? Agility: developers are more responsive to business concerns Security: developers are more responsive to business risk concerns Tradeoffs to be managed Two steps that should be taken care of: Increase security awareness among developers and managers Build security in the processes, practices and tools 10

Security rating The 12 Agile Principles Good for Security too! 1. Satisfy customer through early and frequent delivery 4. Business people and developers work together daily throughout the project 7. Working software is the primary measure of progress 10. Simplicity is essential 2. Welcome changing requirements even late in the project 5. Build projects around motivated individuals 8. Promote sustainable development pace 11. The best results emerge from selforganizing teams 3. Deliver working software frequently 6. Place emphasis on face-to-face communication 9. Continuous attention to technical excellence and good design 12. Team reflects regularly where and how to improve Source: prof. Pekka Abrahamsson / VTT 11

II Some Information Security Challenges and Trends 12

Security Threats are Increasing COMPLEXITY AND CONVERGENCE Products, value nets, services and telecommunication networks are getting more and more complex Holistic understanding of security needed Challenge for agility too! TIGHT TIME SCHEDULES Market sets tight time schedules to product development and thequality and security of products is in danger. Security awareness should increased REACTIVE RACE IS BECOMING TOUGHER Security threat picture changes all the time. Security work has been lately a race between the attackers and the protection developers. Emphasis from reactive to proactive solutions Break the passive build-break-fix cycle! Agility helps! 13

Security Threats are Increasing DIFFUSION OF ICT SOLUTIONS ICT solutions are being used in other fields Security awareness and careful planning needed Agility cannot be applied much DEPENDENCE OF CRITICAL INFRASTRUCTURES ON ICT In critical infrastructures, such as electricy distribution, ICT solutions are used more and more Understanding of interdependencies needed Agility cannot be applied much Security awareness Understanding interdependencies 14

III Security Assurance and Agile Security Development 15

Security Assurance: Emerging Novel Techniques and Tools Security assurance activities are needed in agile SW R&D too, and should be integrated into the agile processes! Examples of security assurance techniques: Security Analysis: threat and vulnerability analysis important, its connection to requirement engineering should be improved, forms the basis for assurance! THERE ARE CHALLENGES IN CARRYING OUT SECURITY ANALYSIS IN THE AGILE PROCESSES! (and even in traditional R&D processes!) Security Testing: tools available for network level and some for application level testing Security Auditing: perspectives: information security management; security engineering Security Monitoring: beyond IDS/IPS systems, holistic monitoring, mobile versions (mainly maintenance phase!) 16

Information Security Management vs. Security Engineering Information security management (ISM) is targeted at the security processes and practices in the organisation. Security engineering is targeted at the R&D of security solutions in products / services / technical systems. Both of them should be addressed in Agile Software Development. Business-level security practices Cost-benefit analysis on security Trust in business collaboration Business level risk analysis and management Information security management (ISM) Security engineering (products, services, technical systems) 17

VTT s Agile Security Development (ASD) Framework FOR WHOM: the client organization, which wants to develop/verify the level of information security of the subcontractors; an SME, which wants to develop information security from it s own baseline WHAT: an agile process model for developing an information security management system, fast and effective improvement of the current information security state and level, ISO 17799 compatibility WHY: a clear and feasible model, efficient working model, a) improving and b) maintaining the subcontractor s or SME s information security level HOW: the guidance and consultation of experts, high utilization of the company s own resources, targeted to the right need, integrated with the organization s guidance system ASD = Agile Security Development 18

Agile Security Development (ASD) ASD kick-off - goals - timetables - resources Risk Analysis (e-risk) Information Security mapping (on-site) ASD tools Evaluation DB ASD method Best Practices -documents Information Security audit and certification (on-site) Laws Client docs and other guiding docs Maintenance process 19

Agile Security Development (ASD) Management meeting - Requirements in terms of overall organizational function - Management s statement of commitment Measurement - Definition of the measures, - Testing and execution Information security policy - Definition and execution - Compatibility with interest groups - Communications Education - Definition, materials - Execution Strategic security - Information security organization, clarification of liabilities - Asset classification and controls - Personnel safety - Physical safety Instructions - Definition and execution - Communications - Scope Operational safety - Access control - Systems usage, development, maintenance, acquisition - Actions in case of information security incidents Continuity planning - Definition and execution - Creation of the scenarios 20

Background material of ASD ISO 17799, 2700x Common Criteria Cobit ITIL ISF SSE-CMM BSI PK-RH OCTAVE CISSP etc. Best Practices documents applied 21

Conclusions Agility and security have tradeoffs, the biggest difference is the emphasis of risks in security. Security should be built in to the agile process, practices and tools (e.g. security solution patterns, standard solutions, taking security into account proactively). Both information security management (ISM) and security engineering practices are needed in the Agile Software R&D. Security assurance should be an integral part of SW R&D. 22

REIJO SAVOLA Network and Information Security Research Coordinator Tel. +358 20 722 2138 GSM +358 40 569 6380 Fax +358 20 722 2320 Email Reijo.Savola@vtt.fi VTT TECHNICAL RESEARCH CENTRE OF FINLAND Network and Information Security Research Kaitoväylä 1, Oulu, FINLAND PL 1100, 90571 Oulu, FINLAND www.vtt.fi VTT CREATES BUSINESS FROM TECHNOLOGY 23