Increasing Security for DoD Systems, Through Specific Security

advertisement
A Ph.D Proposal By:
Sarah Pramanik
Computer Science Department
University of Colorado, Colorado Springs
Presented On:
06/17/2011
Presentation Outline
 Problem Background
 Related Research
 Approach
 Tasks
 Path Forward
2
3
What is a Security Architecture?
 According to NIST [85] a Security Architecture should:
 Acknowledge current security services, tools and
expertise, outline forecasted business needs and
requirements
 Clearly articulate an implementation plan
 Supplement with an integrated schedule of tasks ,
establish project timelines, provide estimates of
resource requirements, and identify key project
dependencies
 Focusing on protecting confidentiality, integrity, and
availability
4
Architecture Development Issues
 Scope of architecture, or size of program, may be
different than currently available expertise
 Level of acceptable risk is subjective (no industry
standard)
 Inclusion of security architecture as an embedded
element
5
Why Security Architecture
 Working as a Security Architect
 Very large program, limited time and budget
 How do I know I have done my job?
 Currently assessing risk and architecture is subjective
 DoD Information Assurance Certification and
Accreditation Plan (DIACAP)
 Real World Issue
 Severe consequences if security is not correct
6
A Comprehensive Security
Architecture
 Why does there need to be a Security Architecture
Methodology?
 What does the methodology need to encompass?
 How can a Security Architecture be evaluated?
7
Why a Security Architecture
Methodology
 Security must satisfy a variety of laws, policies and
regulations
 Security can get lost in complex systems
 Need to avoid bolting on at the end
 Need to mitigate program risk
 The Security Architecture is not just one document
8
Encompassing Methodology
 A methodology must step the architect through each
aspect of securing the system
 Identification of elements to complete during each
phase of the system engineering lifecycle
 Identification of cost effective and low risk system
protections
 Continuous review of the system with a security
architect’s mindset
9
Security Architecture Evaluation
 Quantifiable method for assessing a security
architecture
 Method for evaluating risk to a system

Based on the protections put in place and any residual
vulnerabilities
 Automated way of looking at the architecture before the
system is implemented
10
11
Information Assurance
 Information Assurance (IA) is the practice of
managing risks related to information
 IA primarily deals with the Confidentiality, Integrity,
and Availability of information
 Part of a Security Architecture is the application of
layered IA defenses into a system
12
Information Assurance
Layers of Information Assurance [97]
13
IA Requirements
 DoD programs follow different sets of IA
requirements, depending on the type of system
 DoDI 8500.2, JAFAN 6/9, DCID 6/9

All are very similar, with only a few minute differences
 There is a move (in the Navy at least) to consolidate to
the NIST SP 800-53

This may also require a move from DIACAP to NIST SP 800-37
14
IA in System Engineering Lifecycle
 Information Assurance or Information System Security
Engineering should not be isolated into one piece of
the system
 Systems Engineering typically considers security to
just be a specialization that it should be done in
parallel with the systems lifecycle [5].
 Security engineers must be incorporated into each IPT,
knowing only system level information is not sufficient
15
System Engineering Lifecycle
 Systems engineers perform such tasks as requirements
decomposition, interface definition and functional
decomposition of the system[5]
 Each aspect of a task can potentially affect the overall
security posture of the system
16
Existing Architecture Frameworks
 Zachman Framework [99]
 Department of Defense Architecture Framework
(DoDAF) [97]
 Sherwood Applied Business Security Architecture
(SABSA) [92]
 Information Assurance Technical Framework (IATF)
[75]
17
Zachman Framework
 The Zachman framework is the predecessor to various
frameworks used for system architectures.
 A formal and structured look at an enterprise and it is a
taxonomy
 It is not a methodology
18
DoDAF
 Shows the system through the lens of specific




stakeholder concerns
It is organized into multiple views
It is a requirement on most major DoD programs
It provides a functional view of the system
Useful in describing the operational view
19
SABSA
20
Existing Evaluation Methods
 “There is no common framework in any current
evaluation scheme or criteria that directly supports
measuring the combined security effectiveness of
products.” [87], [97]
 The National Information Assurance Partnership
(NIAP) and Common Criteria (CC) both provide
evaluations on specific products
21
22
Theory vs. Real World
 This research is being applied in real-time
 Initially followed SABSA to integrate into a DoDAF
model
 DoDAF was too high-level
 Needed a systematic approach to:
 Explain what needs to occur to the IPTs and security
team
 Identify risks, cost and schedule issues due to security
23
Continued Application
 Trial and error
 Organization is key to success
 Requirements decomposition
 Different interpretations
 Evaluation
 Subjective and unquantifiable
24
A Systematic Approach
 Inclusion in overall system life-cycle
 Systematic Methodology
 A road map for the IPTs
 Assurance of completeness
 Security Architecture Evaluation
 Quantifiable
 Programmatic Risk Reduction
25
26
Task #1
 Integration of Security into System Engineering
Lifecycle
 Follow the formalized Systems Engineering
Methodology as presented in[5] and show how security
should be integrated
 Compare with how it is currently done on most large
programs
27
Task #2
 Creation of Security Architecture Methodology
 Create a methodology that encompasses many of the
attributes focused on in the frameworks, but gives an
architect a step-by-step process to follow
 The architect will be able to adequately gauge where
they are in the process, which will allow for more
effective budget and schedule management
28
Task #3
 Creation of Automated Architecture Evaluation Tool
 Create a program that brings in the most critical aspects
of a system design to provide an assessment of the
security posture before the system is built
 This will allow for changes in the design early on, which
reduces risk
29
Task #4
 Coding Standards
 Complete a secure coding standard and software
assurance plan that provide developers an
understanding of how they contribute to the overall
security posture
 Currently in the process of being implemented as a
sector standard, and being used for other programs
30
Task #5
 Program Effects
 As part of the look at the Systems Engineering
Methodology, review any known statistics of
incorporating IA, and provide an estimate, based on
time and schedule reduction of risk reduction, and
potential cost savings
31
32
Timeline
Aug-09
Feb-10
Sep-10
Mar-11
Oct-11
Apr-12
Software Security Research
Software Security Application
Security Architecture Methodology
Vulnerability Analysis and Architecture Tool Development
Experimentation and fine tuning of tool
Duration
Application of Tool for Real System
Changes to system due to tool results
Analysis of Data from Penetration Testing
Enhanced Systems Engineering Lifecycle Methodology
33
Evaluation Plan
 Application of security architecture methodology on
current program and on a mock system
 Application of enhanced system engineering
methodology on a mock system
 Comparison of systematic security architecture
methodology to methods used on other programs
34
Success Criteria
 Demonstrate a program that can help assess the
security architecture for vulnerabilities
 Provide a system security architecture methodology,
that covers all aspects of creating a useful security
architecture, and show that it can be used in other
programs and on a variety of complex systems
 Provide a process and method for incorporating
security into the overall systems engineering
methodology and show that it can be used in other
programs and on a variety of complex systems
35
Potential Contributions
 New methodology for the creation of security
architectures on large complex systems
 New methodology for the incorporation of security
into the overall systems engineering lifecycle
 New tool to assess the vulnerabilities in a system,
based on a model before a system is built
36
Questions/ Comments?
37
References
 [5] Alexander Kossiakoff and William N. Sweet, Systems
Engineering Principles and Practice, 2003 © John Wiley
and Sons Inc.
 [8] Birgit Pfitzmann,” Multi-layer Audit of Access Rights,”
W. Jonker and M. Petkovi´c (Eds.): SDM 2007, LNCS 4721,
pp. 18–32, 2007.
 [13] Committee on National Security Systems Instruction
No. 1253, 2009 October“Security Categorization and
Control Selection for National Security Systems, Version 1,”
Committee on National Security Systems.
 [20] Department of the Navy (DoN), “Security Control
Mapping,” SECNAV DON CIO, 1000 Navy Pentagon,
Washington, DC.
38
References
 [34] Heru Susanto, Fahad bin Muhaya, “Multimedia Information
Security Architecture Framework,” 2010 © IEEE.
 [40] Karen Goertzel, “Software Security Assurance: A State of the
Art Report,” IATAC, Defense Technical Information Center.
 [71] National Institute of Standards and Technology Special
Publication 800-53 Revision 3, 2009 August 2009, includes
updates as of 05-01-2010” Recommended Security Controls for
Federal Information Systems and Organizations,” NIST,
Gaithersburg, MD.
 [75] National Security Agency Information Assurance Solutions
Technical Directors, “Information Assurance Technical
Framework,” Release 3.0, September 2000.
39
References
 [80] North American Electric Reliability Council, 2004,
“NERC Cyber Security Activities,” Available:
http://www.nerc.com.
 [85] Richard Kissel et al, National Institute of Standards
and Technology Special Publication 800- 64, Revision 2,
2008 October, “Security Considerations in the System
Development Life Cycle,” NIST, Gaithersburg, MD.
 [87] Richard S. Hall, 2005 May 13, “Oscar Security” Release
version: 1.0.5 Available: http://oscar.ow2.org/security.html
 [92] SABSA Ltd. 2010 ©SABSA, “The SABSA Method,”
Available: http://www.sabsa-institute.org/[96]
40
References
 [97] Wikipedia 2010 December 14, “Department of
Defense Architecture Framework,” Available:
http://en.wikipedia.org/wiki/Department_of_Defense
_Architecture_Framework
 [98] Wikipedia 2010 December 10, “Information
Assurance,” Available:
http://en.wikipedia.org/wiki/Information_assurance
 [99] Wikipedia 2010 December 10, “Zachman
Framework,” Available:
http://en.wikipedia.org/wiki/Zachman_Framework
41
42
Publication/Conference
 Northrop Grumman Software Symposium
 Presented a talk on “Software Security Architectures:
Principles in Application,” Baltimore MD, 2010.
 Northrop Grumman Software Center Of Excellence
 “Spotlight on Information Assurance in the Real World,”
Issue 3, June 2010.
43
Security
Architecture
Security
Services
Security Tools
Implementation
Plan
Requirements
Business
Needs
Primary Information
Schedule of
Tasks
Expected
Outcomes
Timeline
Resource
Requirements
Project
Dependencies
Supplemental
Information
Implementatio
n Plan
Ports,
Protocols,
Services
Component
Design
Physical
baseline w/
PPSM over IP
Networks
Component
Trace
Vulnerability
Assessments
Security
Services
Interoperability
Issues
Physical
baseline w/
services
Requirements
Component
Level
Requirements
Vulnerability
Assessments
STIGs
System Life-cycle Models
[5]
Concept and Technology Development
DoD
5000
phases
Mission need
Determination
ISO/IEC
15288
stages
NSPE
stages
Component
Exploration
Concept
Technical
Feasibility
Concept Development
Needs
Analysis
Concept
exploration
System
Integration
System
Demonstration
Development
Conceptual
Systems
Engineering
Stages
Systems
Engineering
Phases
Component
advanced
development
Concept Exploration
Concept
Definition
Development
Production
Production
preparation
Engineering Development
Advanced
Development
Engineering
Design
Production
&
Deployment
Integration
& evaluation
Full-scale
production
Operation &
support
Utilizat
ion
Support
Product support
Post Development
Production
Operation &
support
System Security
Engineering
Methodology
1
Concept
Development
Needs
Concept
Analysis Exploration
Concept
Definition
2
3
Engineering
Development
Advanced
Devel
Engineering
Design
Integration
&
Evaluation
Post
Development
Production
Operations
& Support
Phase Out
& Disposal
Operational
Deficiencies
Unacceptable
Residual Risk
System Functional
Specifications
Functional
Security Elements
Concept
Development
Security
Architecture
Concept
Technological
Opportunities
New
Vulnerabilities
and protection
mechanisms
Production
Specifications
Security Architecture
and Configuration
Engineering
Development
Integration of
Security
Concepts into
System
Defined System
Concept
Defined
Security
Concept
Operation &
maintenance
IAVMs
Post
Development
Sanitization,
Destruction
Production
System
Baked-in-IA
Installed
Operational
System
Integrated
Security
Operational
Deficiencies
Unacceptable
Residual Risk
System
Operational
Requirements
8500.2 (or 800-57)
Decomposition
Needs
Analysis
Concept
Exploration
System studies
Best integration of
security
Technological
assessment
New
vulnerabilities/risks?
Operational analysis
Interoperability Security
Technological
Opportunities
New
Vulnerabilities
and protection
mechanisms
System
performance
requirements
Secondary Decomp
Concept
Definition
Concept synthesis
Does synthesis have
security?
Feasibility experiments
Does Security Inhibit Fn?
Requirements definition
Security Requirements
System Studies
Cryptography
and CDS
System
Functional
Specifications
Technical reqs
Candidate
System
Concepts
Do they meet
security
constraints?
Trade-off analysis
Crypto design, boundary
defense, CDS
Functional Architecture
Security Views –
beginning of Security
Architecture
Subsystem definition
Security definition
Defined System
Concept
Incorporated
Security Concept
System
Functional
specifications
Technical reqs
System Design
Specifications
Security Design
Specifications
Test & Evaluation
Plan
Ensure Security Test
Advanced
Development
Engineering
Design
Risk Abatement
Gov. Schedule
Subsystem demonstration
Subsystem security
Component design
reqmts
Component security req
Component Engineering
Security implementation
Component Test
Security test
Reliability Engineering
Unacceptable Security
Defined System
Concept
Incorporated
Security
Concept
Validated
Development
Model
High-level
Security
Architecture
Engineered
Prototype
Secure Code
Production
Specifications
Security
Specifications
Integration
and
Evaluation
System Integration
STIGs, C&A
Prototype Test
Software security
Operational Evaluation
C&A
Production
System
Integrated
Security
Production
Specifications
Integrated
Security
Operational
Documentation
Security Manual
Production
Operation
and Support
Tooling & Test Eqpt
Pentesting, Vuln
Assessments
Production & Accept
Gov. Acceptance
System Delivery
Contractor Docs.
Production
System
Integrated
Security
Disposal Plan
Destruction
Plan
Disposal
Sanitization,
Destruction
Component Engineering
Vuln assessments
Component Test
Security changes
Reliability Engineering
Delivered
System
Obsolete
System
Commercial
Federal
DoD
BS 7799
NIACAP
DITSCAP
NISCAP
DIACAP
DoDIIS
ISO 27001
JAFAN 6/3
SP 800-37
SP 800-37
Contractor
NISPOM
IC
NRO
NGA
Download