How To Ensure Security In A System



Similar documents
Supply-Chain Risk Management Framework

Applying Software Quality Models to Software Security

Risk Management Framework

2012 CyberSecurity Watch Survey

Building a Body of Knowledge for ICT Supply Chain Risk Management

Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0

Exploring the Interactions Between Network Data Analysis and Security Information/Event Management

Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Software Security Engineering: A Guide for Project Managers

Merging Network Configuration and Network Traffic Data in ISP-Level Analyses

Building Resilient Systems: The Secure Software Development Lifecycle

Assurance Cases for Design Analysis of Complex System of Systems Software

Software Assurance Competency Model

Software Security Engineering: A Key Discipline for Project Managers

Moving Target Reference Implementation

Introduction to the OCTAVE Approach

Assurance in Service-Oriented Environments

Resolving Chaos Arising from Agile Software Development

Extending AADL for Security Design Assurance of the Internet of Things

Integrated Measurement and Analysis Framework for Software Security

A Framework for Categorizing Key Drivers of Risk

Monitoring Trends in Network Flow for Situational Awareness

SOA for Healthcare: Promises and Pitfalls

Information Asset Profiling

A Study of Systems Engineering Effectiveness. Building a Business Case for Systems Engineering

Architectural Implications of Cloud Computing

Deriving Software Security Measures from Information Security Standards of Practice

Evaluating the Quality of Software Engineering Performance Data

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division

Getting Started with Service- Oriented Architecture (SOA) Terminology

Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division

Contracting Officer s Representative (COR) Interactive SharePoint Wiki

Introduction to the Security Engineering Risk Analysis (SERA) Framework

Evaluating and Mitigating Software Supply Chain Security Risks

Sustaining Operational Resiliency: A Process Improvement Approach to Security Management

Network Monitoring for Cyber Security

Incident Management Capability Metrics Version 0.1

Preview of the Mission Assurance Analysis Protocol (MAAP): Assessing Risk and Opportunity in Complex Environments

Buyer Beware: How To Be a Better Consumer of Security Maturity Models

CMMI: What do we need to do in Requirements Management & Engineering?

Software Supply Chain Risk Management: From Products to Systems of Systems

Agile Development and Software Architecture: Understanding Scale and Risk

Service Measurement Index Framework Version 2.1

Requirements Engineering for SaaS Application Security in Cloud Using SQUARE Methodology

Survivability Analysis Framework

Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example

The Key to Successful Monitoring for Detection of Insider Attacks

Network Analysis with isilk

DoD Software Migration Planning

The Development of a Graduate Curriculum for Software

Security Touchpoints When Acquiring Software. Dr Carsten Huth Nadim Barsoum Dawid Sroka

Experiences in Migrations of Legacy Systems

The CERT Top 10 List for Winning the Battle Against Insider Threats

Common Testing Problems: Pitfalls to Prevent and Mitigate

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge

Common Elements of Risk

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Defining Incident Management Processes for CSIRTs: A Work in Progress

Cyber Intelligence Workforce

Interpreting Capability Maturity Model Integration (CMMI ) for Business Development Organizations in the Government and Industrial Business Sectors

TDDC03 Projects, Spring 2006

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process

Rationalizing Governance, Engineering Practice, and Engineering Economics in the System and Software Assurance Trade Space

Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals

An Application of an Iterative Approach to DoD Software Migration Planning

Quantitative Methods for Software Selection and Evaluation

SECURITY RISK MANAGEMENT

defense through discovery

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability

CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

A Systematic Method for Big Data Technology Selection

CERT 1 System and Network Security Practices i

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

A Taxonomy of Operational Risks

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

Arcade Game Maker Pedagogical Product Line: Marketing and Product Plan

Security and Project Management

Security Engineering Approach for the Development of Secure Information Systems

Wireless Emergency Alerts (WEA) Cybersecurity Risk Management Strategy for Alert Originators

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

A Taxonomy of Operational Cyber Security Risks

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

CERT Resilience Management Model (RMM) v1.1: Code of Practice Crosswalk Commercial Version 1.1

Managing Security Risks in Modern IT Networks

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Security Software Engineering: Do it the right way

Network Security. Introduction. Security services. Players. Conclusions. Distributed information Distributed processing Remote smart systems access

Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability, Version 2.0

Penetration Testing Tools

CERT Resilience Management Model (CERT -RMM) V1.1: NIST Special Publication Crosswalk

Ipek Ozkaya Senior Researcher

Technical Metrics Aren t Enough: 10 Strategic Security Measures

Risk Management Frameworks

Abuse of CPE Devices and Recommended Fixes

Software Assurance Curriculum Project Volume I: Master of Software Assurance Reference Curriculum

Transcription:

Software Assurance vs. Security Compliance: Why is Compliance Not Enough? Carol Woody, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2012 Carnegie Mellon University

Current Challenge for Security Compliance Acquisition Life Cycle Software Supply Chain 2

How is Security Compliance Addressed? Reliability, quality, and effective systems engineering are considered sufficient to address security Security requirements are Established at the system level based on concerns for confidentiality, integrity, and availability (CIA) Assigned to components through system engineering decomposition Not required until Milestone B 3

Security Compliance Limitations CIA principles were developed in 1974, and much has changed since then Effective software engineering is not being addressed by system engineers Many acquisition decisions affecting security are made before Milestone B 4

Origins of CIA - 1 Saltzer and Schroeder, The Protection of Information in Computer Systems, Communications of the ACM, 1974 Defined security as techniques that control who may use or modify the computer or the information contained in it Described the three main categories of concern: confidentiality, integrity, and availability (CIA) 5

Origins of CIA - 2 Technology environment in 1974 S360 in use from 1964-1978 S370 came on the market in 1972 COBOL & BAL programming languages in use MVS operating system released in March 1974 6

Origins of CIA - 3 What s missing? Internet Morris worm, which occurred in November 1988 49,296 common vulnerabilities and exposures (CVE) Java, C++, C# Mobile computing Bluetooth Stuxnet attack on isolated supervisory control and data acquisition (SCADA) systems Cloud computing etc. 7

Software Assurance Picks up where compliance leaves off Definition: Software assurance (DHS Software Assurance Curriculum Project) Application of technologies and processes to achieve a required level of confidence that software systems and services function in the intended manner, are free from accidental or intentional vulnerabilities, provide security capabilities appropriate to the threat environment, and recover from intrusions and failures. 7 principles must augment CIA 8

7 Principles for Software Assurance 1. Risk: Perception of risk drives all assurance decisions. 2. Interactions: Systems are highly inter-connected and share the risks of all connections. 3. Trusted Dependencies: Your assurance depends on other people s assurance decisions and your level of trust for these dependencies. 9

7 Principles (continued) 4. Attacker: A broad community of attackers with growing technology capabilities can compromise any and all of your technology assets - there are no perfect protections, and the attacker profile constantly changes. 5. Coordination: Assurance requires effective coordination among all technology participants and their governing bodies. 10

7 Principles (concluded) 6. Dynamic: The threat is always changing. Assurance is based on governance, construction, and operation and is highly sensitive to changes in each area. 7. Measurable: A means to measure and audit overall assurance must be built in. If you can t measure it you can t manage it. 11

Systems Engineering vs. Software Engineering Systems Engineering Assumptions Systems can be decomposed into discrete, independent, and hierarchically-related components (or subsystems) Components can be constructed and integrated with minimal effort based on the original decomposition Quality properties can be allocated to specific components Software Engineering Realities Software components are often related sets of layered functionality (one layer is not inside another) Interactions of components (not the decomposition) must be managed Security properties relate to composite interactions (not to individual components) applications System Sub-system Interfaces to capabilities provided by a layer common software services Within and outside of the system generic device access (e.g., LAN, device drivers) HW SW 12

Role of Software in Systems From the NRC Critical Code Report * Software has become essential to all aspects of military system capabilities and operations p.19 1960 8% of the F-4 aircraft functionality 1982 45% of the F16 aircraft functionality 2000 80% of the F-22 aircraft functionality * Committee for Advancing Software-Intensive Systems Producibility; National Research Council (NRC). Critical Code: Software Producibility for Defense, 2010 13

Systems Engineering vs. Software Engineering Systems Engineering Assumptions Systems can be decomposed into discrete, independent, and hierarchically-related components (or subsystems) Components can be constructed and integrated with minimal effort based on the original decomposition Quality properties can be allocated to specific components Software Engineering Realities Software components are often related sets of layered functionality (one layer is not inside another) Interactions of components (not the decomposition) must be managed Security properties relate to composite interactions (not to individual components) applications System Sub-system Interfaces to capabilities provided by a layer common software services Within and outside of the system generic device access (e.g., LAN, device drivers) HW SW Systems engineering is insufficient for software-reliant security 14

Software Assurance Impact on C&A Focusing on individual systems is insufficient Critical services used by the software are not considered Differences in security controls for systems tied to the same mission are not considered Software development is increasingly in the supply chain, and security controls must be considered during acquisition Missions, which extend beyond a single system, define the functionality that is intended Software assurance methods are required to build effective operational security 15

Software Assurance Methods Mission Thread Analysis Supply Chain Risk Management Security Requirements Elicitation (SQUARE) Measurement 16

Software Assurance Across the Life Cycle 17

Mission Thread Analysis 18

Mission Thread Analysis Establish the role of mission success (functioning as intended) for system and software assurance Analyze potential mission failure Connect the software and systems to the operational mission How is security defined and validated? Will the mission survive a security compromise? 19

Tool: Survivability Analysis Framework 20

Analysis of Mission Failure Potential Who identifies and manages an error? Human or technology control? Coordination of responses across multiple components (multiple contractors?) Which faults should be reported and how? Logging and alerting can easily overload resources Will the receiver understand an error and know what to do? How could an attack go undiscovered in the cracks between systems? 21

Building Justified Confidence Building the System Delivered System Released System Explanation of why confidence is justified Mission Thread Analysis: building the case Acceptance Case 22

Mission Thread Resources Survivability Analysis Framework, Robert Ellison & Carol Woody. (CMU/SEI-2010-TN-013), June 2010. http://www.sei.cmu.edu/library/abstracts/reports/10tn013.cfm Survivability Assurance for System of Systems, Robert Ellison, John Goodenough, Charles Weinstock, & Carol Woody. (CMU/SEI-2008-TR- 008), May 2008. http://www.sei.cmu.edu/library/abstracts/reports/08tr008.cfm 23

Supply Chain Risk Management 24

State of Security in Software Products MITRE has documented over 700 software errors in commercial products that have led to exploitable vulnerabilities: Common Weakness Enumeration (CWE) 1 58% of all products submitted to Veracode for testing did not achieve an acceptable security score upon first submission 2 Forrester reports in Application Security: 2011 And Beyond 3 47% do not perform acceptance tests for third party software 46% follow a homegrown application security methodology instead of one that had been independently validated 27% do not perform security design 1. http://cwe.mitre.org 2. Fall DHS SwA Forum 2010 3. http://go.microsoft.com/?linkid=9777219 25

Limits for Supply Chain Risk Mitigations Total prevention is not feasible because of the sheer number of risks; limited development visibility; uncertainty of product assurance; and evolving nature of threats, usage, and product functionality Responding exploit by exploit is a losing game Skilled attackers know system weaknesses better than defenders As networks and operating systems are hardened, attackers exploit application software Identify the risks, establish evidence for what has been mitigated, monitor gaps 26

Acquisition of Products 27

Supply Chain Factors Supply chain risks for a product is reduced to acceptable level Supplier Capability Supplier follows practices that reduce supply chain risks Product Security Delivered or updated product is acceptably secure Product Distribution Methods used to transmit product to the purchaser guard against tampering Operational Product Control Product is used in a secure manner 28

Acquisition of Systems and Components 29

System Security Must Be Added Supply chain risks for system reduced to acceptable level System design should ensure that externally developed products including legacy software are used in a secure manner Addressed at the product level Supplier Capability Supplier follows practices that reduce supply chain risks Product Security Delivered or updated product is acceptably secure Product Distribution Methods used to transmit the product to the purchaser guard again tampering System Security Component products are assembled for effective system security Operational Product Control Product is used in a secure manner 30

Stronger Integrator Criteria is Needed Integrator is providing a unique product Applying practices such as threat modeling at the system level can be more demanding than it is for a product Product development long product life - incremental focus on software weaknesses appropriate to that supplier s domain and products, guided by product history relatively small and stable set of suppliers An integration contractor or custom system developer multiple one-off, relatively short-lived efforts multiple functional domains multiple sets of software products, suppliers, and subcontractors 31

Supply Chain Resources Software Supply Chain Risk Management: From Products to Systems of Systems, Robert J. Ellison, John B. Goodenough, Charles B. Weinstock, & Carol Woody. (CMU/SEI-2010-TN-026), December 2010. http://www.sei.cmu.edu/library/abstracts/reports/10tn026.cfm Evaluating and Mitigating Software Supply Chain Security Risks, Robert J. Ellison,, John B. Goodenough, Charles B. Weinstock, & Carol Woody. (CMU/SEI-2010-TN-016), May 2010. http://www.sei.cmu.edu/library/abstracts/reports/10tn016.cfm Webinar: Securing Global Software Supply Chains, Robert Ellison, June 2010. http://www.sei.cmu.edu/library/abstracts/webinars/securing-global- Software-Supply-Chains.cfm 32

Security Requirements Elicitation (SQUARE) 33

SQUARE Methodology to help organizations build security into the early stages of the production life cycle Addresses eliciting, categorizing, and prioritizing security requirements Security requirements are treated at the same time as the system's functional requirements, and carried out in the early stages specified in similar ways as software requirements engineering and practices carried out through a process of nine discrete steps 34

The SQUARE Process A robust SQUARE tool is available for download from http://www.cert.org/sse/square.html 35

SQUARE Resources Software Security Engineering: A Guide for Project Managers. Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, & Nancy R. Mead. Addison Wesley Professional, 2008. (Available from Amazon.com.) U.S. Department of Homeland Security. Build Security In: Requirements Engineering. U.S. Department of Homeland Security. https://buildsecurityin.us-cert.gov/daisy/adm-bsi/articles/best-practices/ requirements.html Security Quality Requirements Engineering, Nancy R. Mead, Eric Hough, & Ed Stehney. (CMU/SEI-2005-TR-009), November 2005. http://www.sei.cmu.edu/library/abstracts/reports/05tr009.cfm Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method, Nancy R. Mead, in Integrating Security and Software Engineering: Advances and Future Visions. Edited by H. Mouratidis and P. Giorgini. Idea Group, pp. 44-69, 2006 (ISBN: 1-59904-147-2). 36

SQUARE Case Study Reports SQUARE-Lite: Case Study on VADSoft Project, Ashwin Gayash, Venkatesh Viswanathan, & Deepa Padmanabhan. Faculty Advisor: Nancy R. Mead. (CMU/SEI-2008-SR-017), June 2008. http://www.sei.cmu.edu/library/abstracts/reports/08sr017.cfm Security Quality Requirements Engineering (SQUARE): Case Study Phase III, Eric Hough, Don Ojoko-Adams, Lydia Chung, & Frank Hung. (CMU/SEI-2006- SR-003), May 2006. http://www.sei.cmu.edu/library/abstracts/reports/06sr003.cfm Privacy Risk Assessment Case Studies in Support of SQUARE, Varokos Panusuwan & Prashanth Batlagundu. Faculty Advisor: Nancy Mead. (CMU/SEI-2009-SR-017), July 2009. http://www.sei.cmu.edu/library/abstracts/reports/09sr017.cfm 37

Security Measurement 38

Definitions Measurement A set of observations that reduce uncertainty where the result is expressed as a quantity 1 Measure A variable to which a value is assigned as the result of measurement 2 1. Hubbard, Douglas W. How to Measure Anything: Finding the Value of Intangibles in Business. John Wiley & Sons, 2007. 2. International Organization for Standardization. ISO/IEC 15939:2007, Systems and Software Engineering Measurement Process, 2nd ed. ISO, 2007. 39

Drivers Definition A factor that has a strong influence on the eventual outcome or result Examples Security Process: The process being used to develop and deploy the system sufficiently addresses security Security Task Execution: Security-related tasks and activities are performed effectively and efficiently Code Security: The code will be sufficiently secure 40

Drivers: Success and Failure States The objective when analyzing a driver s state is to determine how each driver is currently acting. 41

Drivers for Secure Software Development Programmatic Drivers 1. Program Security Objectives 2. Security Plan 3. Contracts 4. Security Process 5. Security Task Execution 6. Security Coordination 7. External Interfaces 8. Organizational and External Conditions 9. Event Management Product Drivers 10. Security Requirements 11. Security Architecture and Design 12. Code Security 13. Integrated System Security 14. Adoption Barriers 15. Operational Security Compliance 16. Operational Security Preparedness 17. Product Security Risk Management 42

Evaluating Drivers Directions: Select the appropriate response to the driver question. Driver Question Response 4. Does the process being used to develop and deploy the system sufficiently incorporate security? Consider: Security-related tasks and activities in the program workflow Conformance to security process models Measurements and controls for security-related tasks and activities Process efficiency and effectiveness Software security development life cycle Security-related training Compliance with security policies, laws, and regulations Security of all product-related information Yes Likely Yes Equally Likely Likely No No 43

Driver Profile The driver profile provides an indication of systemic risk to the mission. It can be used as a dashboard for program decision makers. 44 1. Program Security Objectives 2. Security Plan 3. Contracts 4. Security Process 5. Security Task Execution 6. Security Coordination 7. External Interfaces 8. Organizational and External Conditions 9. Event Management 10. Security Requirements 11. Security Architecture & Design 12. Code Security 13. Integrated System Security 14. Adoption Barriers 15. Operational Security Compliance 16. Operational Sec. Preparedness 17. Product Security Risk Management Driver Value Driver Value

MRD: Focus on Mission Risk Driver Value Systemic risk to the mission (also called mission risk) is defined as the probability of mission failure (not achieving key objectives). From the MRD perspective, mission risk is the probability that a driver is in its failure state. 45

Measurement Resources Integrated Measurement and Analysis Framework for Software Security, C. Alberts, J. Allen, & R. Stoddard. (CMU/SEI-2010-TN-025), September 2010. http://www.sei.cmu.edu/library/abstracts/reports/10tn025.cfm Risk Management Framework, Christopher Alberts & Audrey Dorofee. (CMU/SEI-2010-TR-017). August 2010. http://www.sei.cmu.edu/library/abstracts/reports/10tr017.cfm 46

Summary 47

Compliance Limitations Based on principles that were developed in 1974 and much as changed since that time Does not address security for software-reliant systems Does not address the security risks of software acquisition decisions 48

Focus on Software Assurance Ensure that systems and software function as intended and are free from vulnerabilities Key areas for risk mitigation: Mission Thread Analysis Supply Chain Risk Management Security Requirements Measurement 49

NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this presentation is not intended in any way to infringe on the rights of the trademark holder. This Presentation may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. This work was created in the performance of Federal Government Contract Number FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The Government of the United States has a royalty-free governmentpurpose license to use, duplicate, or disclose the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copyright license under the clause at 252.227-7013. 50