Security architecture and framework Design and pilot implementation



Similar documents
A home healthcare system in the cloud addressing security and privacy challenges

Evaluation of different Open Source Identity management Systems

Building Security into the Software Life Cycle

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

Wealth Management Formula

ADVANCED CLOUD PRIVACY THREAT MODELING

5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007

Report of the DTL focus meeting on Life Science Data Repositories

JOURNAL OF OBJECT TECHNOLOGY

ECRIN (European Clinical Research Infrastructures Network)

Leveraging New Business Models with Identity Management An e-learning case study

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I

CloudCERT (Testbed framework to exercise critical infrastructure protection)

Securing the Microsoft Cloud

White Paper Strengthening Information Assurance in Healthcare

Accountability by Design for Privacy

SecSDM: A Model for Integrating Security into the Software Development Life Cycle

State of Oregon. State of Oregon 1

Trust and Dependability in Cloud Computing

Secure Software Design in Practice ARES SECSE Workshop

IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11

Securing the Cloud Infrastructure

Industrial Control Systems Security Guide

HIT Workflow & Redesign Specialist: Curriculum Overview

Good metrics aggregate both objective and quantitative

Building Reference Security Architecture

"Data Manufacturing: A Test Data Management Solution"

Privacy Impact Assessment

Supplier Security Assessment Questionnaire

Defending against modern threats Kruger National Park ICCWS 2015

How To Write A Mobile Device Policy

Certified Information Security Manager (CISM)

INFORMATION TECHNOLOGY STANDARD

Identity Management Overview. Bill Nelson Vice President of Professional Services

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

Security and Your SAP System When Working with Winshuttle Products

Qlik Sense Enabling the New Enterprise

Data Management for Biobanks

Cloud Security: Is It Safe To Go In Yet?

Horizontal IoT Application Development using Semantic Web Technologies

Remote Authentication and Single Sign-on Support in Tk20

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Fujitsu Enterprise Security Architecture

Microsoft Services Premier Support. Security Services Catalogue

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Security Controls What Works. Southside Virginia Community College: Security Awareness

SAML Federated Identity at OASIS

Consolidated Audit Trail. Copyright 2014 FINRA

Seven Practical Steps to Delivering More Secure Software. January 2011

Get Confidence in Mission Security with IV&V Information Assurance

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Contextual cloud-based service oriented architecture for clinical workflow

Basic Unified Process: A Process for Small and Agile Projects

Using Enterprise Content Management Principles to Manage Research Assets. Kelly Mannix, Manager Deloitte Consulting Perth, WA.

APPLICATION THREAT MODELING

10231B: Designing a Microsoft SharePoint 2010 Infrastructure

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

how can I comprehensively control sensitive content within Microsoft SharePoint?

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

JOB DESCRIPTION APPLICATION LEAD

Announcements. Project status demo in class

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

Deliverable D1.1. Building data bridges between biological and medical infrastructures in Europe. Grant agreement no.:

United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

SECURITY AND RISK MANAGEMENT

IoT & SCADA Cyber Security Services

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010

The ISDF Framework: Towards Secure Software Development

Transcription:

WP 5 Work Package Meeting Security architecture and framework Design and pilot implementation 3 rd AGM in Munich, 17 February 2015 TUM: Raffael Bild, Florian Kohlmayer, Helmut Spengler EBI: Olga Melnichuk, Marco Brandizi, Ugis Sarkans Session moderation: Wolfgang Kuchinke

Security architecture and framework Guideline for secure, privacy preserving, ethically and legally sound data bridges between RIs Builds upon results from WT 5, 6, D5.1, and D5.2: Usage scenarios developed for D5.1 Legal and ethical groundwork performed for D5.1 and D5.2 Two security and privacy related surveys carried out in WT5 A threat and risk analysis performed in WT6 Designed in WT7 Reported in D5.3 Is laying the foundation for D5.4

Threat and risk analysis - Methodology o Based on surveys, a threat and risk analysis was performed in WT6, using a variant of the STRIDE [1] methodology (security threats), LINDDUN [2] methodology (privacy threats), and NIST Guide for Conducting Risk Assessments [3] [1] M. Howard und S. Lipner, The security development lifecycle: SDL, a process for developing demonstrably more secure software, Microsoft Press, 2006. [2] M. Deng, K. Wuyts, R. Scandariato, B. Preneel und W. Joosen, A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements, Requirements Engineering, Bd. 16, Nr. 1, pp. 3-32, March 2011. [3] NIST Special Publication 800-30, Guide for Conducting Risk Assessments, September 2012.

Threat and risk analysis - Methodology o The threat and risk analysis comprised 7 process steps which were applied to the use case WPs: 1. Define usage scenarios 2. Gather a list of external dependencies, as-is state of security measures, and security assumptions 3. Create one or more Data Flow Diagrams (DFDs) of the application being modeled 4. Determine threat types 5. Identify the threats to the system 6. Determine risk 7. Plan mitigation usage scenarios from D5.1 based on the surveys by suggesting countermeasures based on literature review

Threat and risk analysis - Results Privacy Threat (LINDDUN) Example Risk WP6 WP7 WP8 WP9 WP10 Countermeasure Linkability Identifiability Possibility to detect that different data items are related to the same entity Possibility to relate a set of data to a specific entity / person; to recognize a person by characteristics of data ++ - ++ +++ ++ +++ + +++ +++ ++ - Anonymization - Pseudonymization - Encryption - Access Control Content unawareness A patient is unaware of the information used/shared by the system ++ ++ +++ ++ ++ - Informed Consent Management Policy/ consent noncompliance Lack of evidence that data shared by the system meets applicable legal, policy or consent requirements +++ ++ +++ +++ ++ - Legal regulations - Informed Consent Mgmt. - Data Provider Forms - Ethics Committee approval - Data Access Comm. approval - Data Use Agreement - Material Transfer Agreement - (not relevant), + (low), ++ (medium), +++ (high)

Security architecture - Overview Based on requirements collected in WT 5 and on the threat and risk analysis performed in WT 6 Countermeasures against threats identified in the risk analysis For each countermeasure: Definition of measure Description of threats addressed Options for implementation and deployment Specification of three access tiers Open Restricted Restricted & committee-controlled Activity diagrams describe actions for each access tier

Security architecture - Elements o Specific countermeasures presented and discussed in detail include Authentication Authorization Secure data communication Encryption of data Anonymization Pseudonymization Auditing and provenance management Regulatory elements, such as Data Use Agreements (DUAs), Material Transfer Agreements (MTAs), Informed Consent (IC) management, Data Access Committee (DAC) approval, and Ethics Committee (EC) approval.

Security architecture - Workflow e.g. activity diagram for the restricted & committe-controlled access tier:

Pilot for the security framework Demonstrates feasibility and usefulness of the security architecture by implementing it for a concrete WP4 use case Constitutes a collaborative implementation of secure access to biobank data involving ELIXIR and BBMRI Based on results of WT 5, 6, 7, and D5.3 Integrates and extends already existing results of WP4 Integrates the policy administration repository from D5.2 Is being implemented in WT8 Lead: EMBL-EBI Will be reported in D5.4

Use case Pilot - Overview Researcher wants to obtain microdata / samples Researcher looks for biobanks focusing on disease group x, containing at least y samples of material type z The pilot will implement a complete research workflow To answer such queries in a secure, privacy preserving, legally and ethically sound manner Instantiating the security architecture with all access tiers

Pilot - Central elements BioSamples Database from ELIXIR A prototype instance of the BBMRI catalogue (bbmri.eu, bbmri-lpc) comprising a MIABIS [1] layer and a data cube layer in order to provide a realistic environment Single Sign On service Resource Entitlement Management System Legal Assessment Tool built for D5.2 [1] http://bbmri-wiki.wikidot.com/en:dataset

Pilot - Workflow specification

Pilot - Detailed progress Work performed: Adaptation of the BBMRI software Implementation of SSO using Shibboleth Integration of REMS Remaining tasks: Integration of (mockup) biobanks Integration of the LAT

Pilot - SSO login

Pilot - SSO login

Pilot - Refinement of the request

Pilot - REMS application form

Pilot - Provision of the requested data

Lessons learned All three access tiers are helpful regarding concrete use cases A risk analysis provided valuable input for the security architecture The BBMRI node can be integrated into a secure workflow

Thank you! Any questions?