Risk Management in the Development Process A Progress Report



Similar documents
Security concept for gateway integrity protection within German smart grids

Threat Modeling Smart Metering Gateways

Mobile Application Threat Analysis

Threat modeling. Tuomas Aura T Information security technology. Aalto University, autumn 2011

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Microsoft STRIDE (six) threat categories

Security Threats in Demo Steinkjer

Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP)

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

ICANWK406A Install, configure and test network security

Threat Modeling. 1. Some Common Definition (RFC 2828)

Embedded Java & Secure Element for high security in IoT systems

Vehicular On-board Security: EVITA Project

Secure By Design: Security in the Software Development Lifecycle

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium , Miami Beach FL / USA

IoT IT Security and Secure Development Life Cycle

Security concept for gateway integrity protection within German smart grids

Cisco Trust Anchor Technologies

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

AMI security considerations

Adversary Modelling 1

Security and Privacy in Cloud Computing

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

Facilitated Self-Evaluation v1.0

Network Security in Building Networks

What is Really Needed to Secure the Internet of Things?

COSC 472 Network Security

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Content Teaching Academy at James Madison University

Introduction to Information Security

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Chapter 6: Fundamental Cloud Security

Web-based Modules for Cyberphysical Systems Security

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Full Drive Encryption Security Problem Definition - Encryption Engine

Understanding and evaluating risk to information assets in your software projects

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

CPSC 467b: Cryptography and Computer Security

Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)

Cyber Security Risk Mitigation Checklist

Information Systems Security

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Pervasive Computing und. Informationssicherheit

Third Party Security Requirements Policy

A Framework for Secure and Verifiable Logging in Public Communication Networks

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Security in Vehicle Networks

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

Post-Access Cyber Defense

Fundamentals of Network Security - Theory and Practice-

Excerpt of Cyber Security Policy/Standard S Information Security Standards

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

A Methodology for Capturing Software Systems Security Requirements

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

CS5008: Internet Computing

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

Inadequacies of Current Risk Controls for the Cloud

EnergyAxis System: Security for the Smart Grid

Information Security Basic Concepts

Security Goals Services

Global Telehealth Conference 2012

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

Introduction of Information Security Research Division

Certification Report

Data Security Incident Response Plan. [Insert Organization Name]

MITIGATING RISKS FROM DEVELOPMENT, INTEGRATION, DISTRIBUTION AND DEPLOYMENT Black Duck Software, Inc. All Rights Reserved.

Automotive Suppliers and Cybersecurity

IoT Potential Risks and Challenges

True Identity solution

544 Computer and Network Security

Chap. 1: Introduction

External Supplier Control Requirements

USB Portable Storage Device: Security Problem Definition Summary

Security Testing. How security testing is different Types of security attacks Threat modelling

Understand Electronic-Meter Design to Better Craft Intelligent and Secure Systems

RFID and Privacy Impact Assessment (PIA)

Data Security Concerns for the Electric Grid

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Intelligent Solutions for the Highest IT Security Demands

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

LBSEC.

AGAINST OUTSIDE THREATS

Keeping SCADA Networks Open and Secure DNP3 Security

More effective protection for your access control system with end-to-end security

Transcription:

Risk Management in the Development Process A Progress Report

1 Introduction 2 Smart Meter Gateway - basic facts 3 Real Life Example

Introduction Industry 4.0 and IoT gain importance of Embedded Systems Hardware Costs decline Pressure to innovate and high speed of development dominate Part of the Game: Smart Meters and Smart Meter Gateways with distinct communication over (insecure) networks

Introduction Term Risk Risk Management Definition The likelihood of an unwanted incident and its consequence for a specific asset. (see CORAS) Coordinated activities to direct and control an organisation with regard to risks. (see CORAS)

Introduction Examples of Development Risks People Risks - availability, skill level, experience Size Risks - handling of large teams, increased complexity in large products Process Risks - well defined development process Technology / Tool Risks - new or complex technology increases the risk, availability of reliable tool chains (development environmen, CASE tools) Organisational Risks - financial stability, organisational threats, change in company focus Estimation Risks / Planning Risks - resource estimates and product development time Customer Risks - changes to the customer requirements

Smart Meter Gateway - Overview records energy consumption data transmits energy consumption data to meter operators utilizes a trusted communication channel with the administrator part of the critcial infrastructure needs to be security evaluated (Common Criteria, ISO 15408) on evaluation assurance level 4+ 6.000.000 SMGW installations expected until end of 2020

Smart Meter Gateway - Functional Requirements Storage of meter data and application of tariffing profiles Remote administration channel Support of different meter types user interface for displaying consumption data multi-client capability Support of cryptographic algorithms

Smart Meter Gateway - Security Requirements Secure Storage of private key material HSM chip Pre-Personalization during production Final Personalization during installation Secure communication channels TLS and symmetric cryptographic protocols TLS to communication partners in WAN, HAN and LMN AES secured crypto in LMN (wireless communications) Passive tampering and modification detection Tampering and modification of hard- and software needs to be detected (or be detectable) Functional correctness pertaining Technical Guideline TR 03109 Manufacturer must demonstrate complete support of required functionality

Smart Meter Gateway - Cost assumption Cost-Benefit Analysis was published by Ernst & Young in 2013 (Kosten-Nutzen-Analyse für einen flächendeckenden Einsatz intelligenter Zähler), on behalf of Federal Ministry for Economic Affairs and Energy cost factor value amortisation period Ferraris meter 25 EUR 16 years Intelligent meter 80 EUR 13 years BSI conformant meter 55 EUR 13 years SMGW with HSM, without communication module 80 EUR 13 years SMGW with HSM comm. module and meter 175 EUR 13 years Installation costs per meter 30-100 EUR 13 years Installation costs per Gateway 20-90 EUR 13 years Installation costs per meter / gw. in comb. 40-110 EUR 13 years

Smart Meter Gateway - Development Risks What kind of risks arise? In general most of the risks listed on slide 5 cost limits: (organisational risks, estimation risks, customer risks) unfinished specification (organisational risks, estimation risks, people risks) unfinished security requirements (organisational risks, estimation risks, people risks, tool risks, technology risks) Development was based on unstable external foundations. How to handle this situation?

Chosen strategy Functional and security requirements define the lower bound of a possible development budget During analysis, the security requirements were focussed due to their strong influence on development time and budget Setup a team of experienced sw-engineers and: perform use-case analysis technology studies set up management framework (requirement lists, define sw-development process) get an idea of the required tool chain Following slides show some aspects of the security analysis.

Metrics Definition Tabelle: Defined Metrics Metric Fulfilment of the security requirements formulated Development and production costs Knowledge and knowledge management Availability Explanation Consideration of whether or not a suggested measure / a combination of several measures addresses a given IT security target Costs for the implementation of a suggested measure. Important indicator for staying within the planned development and production budget. Consideration of whether or not the existing engineering knowledge required for implementation of the identified IT security measure is available. Availability of ready partial solutions, use of OTS (off-theshelf) components

Requirements Analysis and System Design subject Environmentand Assumptions Security Targets Adversary Model Security Requirements questions communication interfaces? communication protocols? Are there any trusted external entities? Public or secure environment? Should data be stored or exchanged and what are the relevant security requirements? What might an attacker be capable of? Which interfaces of the system need to be considered in terms of defining the security requirements? Based on assumptions

Threat Modeling set up a model of all interfaces and communication flows model closed gaps in the unfinished specification (Techncial Guideline) Identification of threats, risks and potential weaknesses application of S.T.R.I.D.E classification and D.R.E.A.D risk rating STRIDE threat categories: Spoofing of user identity Tampering Repudiation Information disclosure (privacy breach or data leak) Denial of service (D.o.S) Elevation of privilege The categories are: Damage - how bad would an attack be? Reproducibility - how easy is it to reproduce the attack? Exploitability - how much work is it to launch the attack? Affected users - how many people will be impacted? Discoverability - how easy is it to discover the threat?

Security Concept Model Type Static Security Model Content Covers all aspects of relevance independent from the data flow. List of Threats and Assets Physical Security Firmware Security (Reverse Engineering Protection, Encryption) Disk Encryption Used Cryptographic Mechanisms Key Material Dynamic Security Model Covers all aspects of dynamic system behavior. List of Threats and Assets communication matrix resource separation availability cryptographic algorithms network interfaces, updates, administration

Results and Next Steps Hardware based on OTS components Open Source Operating System (Linux) All security features implemented Ongoing security evaluation Participant in field tests

Lessons learned The focus on the security requirements has identified the top development efforts. Threat modeling helps in understanding the data flows (because a threat model requires data flows and helps identifying unclear or inconsistent specifications). Technology studies before starting an implementation reduces peoples risks (increases knowledge) and technology risks

Questions? armin.lunkeit(at)openlimit.com