How to Analyze Security with Respect to Change Mass Soldal Lund

advertisement
How to Analyze Security with
Respect to Change
Mass Soldal Lund
19 April 2012
CORAS
1
Acknowledgments
 The research for the contents of this
tutorial has partly been funded by the
European Commission through the FP7
project SecureChange and the FP7
network of excellence NESSoS
CORAS
2
Overview
 Use of risk analysis techniques to analyze
security in systems with change




Challenges and perspectives on change
Risk modeling
CORAS with change
Example from Air Traffic Management (ATM)
CORAS
3
Challenges & Motivation
 Model-driven risk analysis is well suited for
analyzing security
 Challenges when change is taken into account
 Reality change and evolve
 The target system and the environment change and evolve
over time
 Security risks change and evolve over time
 Many risk assessments build on unrealistic
assumptions
 Particular configuration of the target
 Particular point in time
 Model-driven approach is helpful to overcome the
challenges
CORAS
4
Three Perspectives on Change
2
Revolution
Planned
revolution
Unplanned
revolution
Evolution
Planned
evolution
Unplanned
evolution
3
1
Proactive
Reactive
1: The maintenance (a posteriori) perspective
2: The before-after (a priori) perspective
3: The continuous evolution perspective
CORAS
5
Maintenance Perspective
Methodological challenges
Updates
Old target
Current target
Old risks
Current risks
 Reuse the old risk
assessment results
 Avoid having to start from
scratch
 Requires
Old risk
picture
Current risk
picture
Risk assessor
 Identifying updates to target
 Identifying parts of risk picture
affected by the updates
 Updating affected parts of risk
picture
CORAS
6
Before-After Perspective
Planned changes
Current target
Current risks
Future target
Risks due
to change
process
Risk picture
Risk assessor
Future risks
Methodological Challenges
 Obtain and present a risk picture
for the current risks, the future
risks, and the risks to the change
 Requires:
 Characterizing target “as-is” and
“to-be“
 Describing of the process of
change
 Identifying current and future risk
 Identifying risks to the change
process
 Providing a risk picture with
current risks, future risks and
risks to the change process
CORAS
7
Continuous Evolution Perspective
Target at
time t0
Risks at
time t0
Evolution
Target at
time t1
Risks at
time t1
Evolution
…
Target at
time tn
…
Risks at
time tn
Methodological challenges
Risk picture
Risk assessor
 Identify and present evolving risks in a
dynamic risk picture/risk model
 Requires:
 Generalizing target to characterizes
evolution
 Identifying the risks affected by evolution
 Characterizing the evolution of risks
 Presenting a dynamic risk picture
related to evolution of target
CORAS
8
CORAS – Model-Driven
Risk Analysis
 CORAS consists of
 Method for risk analysis
 Language for risk modeling
 Tool for editing diagrams
 Stepwise, structured and systematic
process
 Model-driven
 Models as basis for analysis
 Models as documentation of results
 Extension for dealing with changes
 Risk modeling in the before-after
perspective
CORAS
9
Risk Modeling
 Risk analysis: the process of understanding the
nature of risks and determining the risk level
 Risk modeling: techniques for risk identification,
documentation and estimation
 Risk model: structured way of representing the
risk picture as unwanted incidents and its causes
and consequences
 CORAS language is a risk modeling language for
 Structuring events and scenarios leading to incidents
 Estimating likelihoods of incidents
CORAS
10
CORAS Threat Diagram
v1
[P1]
r1
Pb
Threat
Consequence
Pa
v3
[P3]
Pc
v4
[P4]
Pd
v2
[P2]
r2
v7
[P7]
Likelihood
v5
[P5]
r3
Asset
Pe
a
Pf
v6
[P6]
c
Unwanted
incident
Threat scenario
CORAS
11
CORAS with Change
 Risk modeling in the before-after
perspective
 Explicit traceability from risk model to
target model
 Explicit modeling of
 Risk picture before change
 Risk picture after change
 Changes in likelihoods, consequences and
risk levels
CORAS
12
CORAS Threat Diagram with
Change
Risk element
before
Target element before
t1
Target element before-after
t2
v1
[P1]
Risk element before-after
Pa
r1
Pb/Pb’
v3
[P3]/[P3’]
Pc/Pc’
v4
[P4]/[P4’]
Pd/Pd’
v2
[P2]/[P2’]
v7
[P7]/[P7’]
r2
c/c’
a
Pf
Pe
v5
[P5]
v6
[P6]
r3
t3
Target element after
Risk element after
CORAS
13
Two Views on CORAS Diagrams with Change
Before
After
14
Air Traffic Management (ATM)
 Aggregation of services provided by Air
Traffic Controllers (ATCOs)
 Main responsibility is to maintain horizontal
and vertical separation among aircrafts and
possible obstacles
 Limited interaction with
the external world
 Humans at the centre of
the decision and work
process
CORAS
15
Target of Analysis
 Arrival management and the role of air traffic
controllers (ATCOs) in the area control centre
(ACC)
 Introduction of Arrival manager (AMAN):
 Decision support tool for the automation of arrival
management
 Introduction of Automatic Dependent
Surveillance-Broadcast (ADS-B)
 GPS-based surveillance technology
 Aircrafts constantly broadcast their position to the
ground and to other aircrafts
CORAS
16
New element:
Automatic
Dependent
SurveillanceBroadcast
Target of analysis
class ATM
Flight Data
Processing
System
Aeronautical
Operational
Information
System
Area Control
Centre
network
: FDPS
: Meteostations
: ADS-B
: Radar
: AOIS
: Surveillance
: ACC network
: Technical room[1..*]
: OPS room[1..*]
: Adjacent ATS unit[*]
Operation
room
Location of Air Traffic
Controllers (ATCOs)
: Aircraft[*]
Adjacent
Air Traffic System
unit
CORAS
17
Assets Identification
 Main concern before changes:
 Information provision (availability)
 Additional concerns after changes:
 Information protection (confidentiality)
ATM service
provider
Availability of
arrival
sequences
Availability of
aircraft position
data
Confidentiality
of ATM
information
CORAS
18
Risk Identification and Estimation
Using Threat Diagrams
ATCO fails to comply
with arrival management
procedures
[rare]
ATCO
Technical
room
Lack of
awareness
Software
error
The consolidation of
data from several radar
sources fails
[possible]
CWP
Creation of false
alarms
[possible]
Duplication of labels
[possible]
Delays in sequence
provisioning
[possible]
Degradation of
aircraft position data
[possible]
minor
Availability of
arrival
sequences
minor
Availability of
aircraft position
data
Before
CORAS
19
Technical
room
Creation of false
alarms
[possbile]/[unlikely]
Software
error
The consolidation of
data from several radar
sources fails
[possible]/[possible]
ATCO fails to comply
with arrival management
procedures
[rare]
Lack of
awareness
Duplication of labels
[possbile]/[possible]
ATCO fails to comply
with AMAN sequence
[rare]
ATCO
minor/
minor
Delays in sequence
provisioning
[possible]/[unlikely]
Availability of
arrival
sequences
CWP
Surveillance
ADS-B transponders
not transmitting correct
information
[likely]
ADS-B
transponder
Degradation of
aircraft position data
[possible]/[possible]
minor/
minor
Availability of
aircraft position
data
ADS-B
Spoofing of
ADS-B data
[rare]
Attacker
Dependence on
broadcasting
Before-After
Eavesdropping ADS-B
communication
[certain]
Critical aircraft position data
leakes to unauthorised third
parties
[rare]
major
Confidentiality
of ATM
information
CORAS
20
Summary
 For systems that change, also the security
risks change and should be analyzed as such
 Only the parts of the risk picture affected by
changes should be analyzed anew
 The model-driven approach lend itself to
handling the challenges of change
 CORAS supports
 Traceability of changes from target system to risk
models
 The explicit modeling of changes to risk
CORAS
21
Download