Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition Chapter 9 The Systems Security Engineering Capability Maturity Model (ISO 21827) Objectives • Follow a staged enhancement process to increase system security capability • Ensure capability maturity based on best practices • Assess supplier fitness based on specified capability requirements • Assess internal capability based on a best-practice model • Target critical areas of security need based on a formal profile Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 2 Overview of the SSE-CMM • The Systems Security Engineering Capability Maturity Model (SSE-CMM) – Also known as ISO/IEC 21827 – Specifies a set of behaviors that an organization can adopt to ensure secure system and software engineering practice – Built around a staged grouping of security engineering best practices – Specifies security engineering practices for the organization as a whole Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 3 Overview of the SSE-CMM • SSE-CCM ensures that appropriate interactions take place with other disciplines, such as: – – – – – System software and hardware Human factors security Test engineering System management Operations and maintenance • The model provides recommendations to ensure acquisition, system management, certification, accreditation, and evaluation Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 4 Overview of the SSE-CMM • Security controls are divided into two areas: – Security Base Practice – Project and Organizational Base Practice • Security Base Practice includes 11 high-level control areas with a number of underlying controls • Project and Operational Base Practice also include 11 high-level control areas and their own control objectives Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 5 Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2014 6 Overview of the SSE-CMM • The capability maturity of the 22 control areas can be judged using a five-level scale: – – – – – Level 1, Performed Informally Level 2, Planned and Tracked Level 3, Managed Level 4, Quantitative Management Level 5, Optimizing Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 7 Overview of the SSE-CMM • SSE-CMM allows an organization to manage product engineering risk at the organizational, enterprise, or project level • Activities support managers, suppliers, buyers, developers, participants, and other stakeholders – By dictating a single set of key practices that can help manage a broad variety of risks while developing and procuring systems and software • The model helps improve the management of risks associated with purchasing or developing software or systems Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 8 Overview of the SSE-CMM • An organization can increase its security engineering capability using the SSE-CMM – Can use it to help develop, manufacture, test, support, or maintain ICT systems and components • Best-practices of the SSE-CMM help stakeholders develop a shared understanding of the relationships required to coordinate : – Schedules – Processes – Development practices Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 9 Background: The SSE-CMM Collaboration • SSE-CMM project grew out of a joint effort between government and industry – Was aimed at developing a model for security engineering • Overall goal was to provide a mechanism for selecting qualified security engineering suppliers – To underwrite overall capability-based assurance • Originated at the National Security Agency (NSA) in 1993 • Eventually involved 42 companies and other government agencies Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 10 Background: The SSE-CMM Collaboration • The model was approved by the ISO as an international standard in 2002 – A second edition was approved by the ISO in 2008 • The model can be used to evaluate best practices for enhanced system and software engineering capability – Makes it an excellent tool for determining supplier abilities and to make decisions about threats and risks that might be present in a worldwide ICT supply chain • Ability to ensure trust is essential for global business Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 11 Background: The SSE-CMM Collaboration • The final product of this effort was the registration of ISO 21827 as a full international standard in 2002 • The International System Security Engineering Association (ISSEA) was named as the assessor and registrar – For organizations wanted to accredit their systems and software engineering processes to the standard Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 12 Structure of the SSE-CMM/ISO 21827 Standard • SSE-CMM is meant to support self-assessment • Assesses processes based on a defined set of key functional elements and produces a set of ratings – Ratings are expressed in the form of a process profile – Evaluate each process on a sliding scale • SSE-CMM assessment greatly increases the level of trust in the ISO 12207-2008 acquisition process – By reducing uncertainty in supplier selection • Suppliers can determine the capability maturity of their own system security processes Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 13 Structure of the SSE-CMM/ISO 21827 Standard • Allows customers to identify common security risks associated with a given procurement project • Also allows customers to balance business needs, requirements, and estimated project costs – Against the known capability of competing suppliers • SSE-CMM compares the actual security capability of a selected process against a target capability profile – The outcomes of that comparison help the organization better identify missing or vulnerable security engineering functions Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 14 The Base Practices of the SSE-CMM • The SSE-CMM embodies a set of standard base practices – Formal practices to ensure that work is executed correctly • Goal of base practices: to disconnect the security engineering process from the practices associated with overall good management • The model employs two dimensions called: – Domain dimension – Capability dimension Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 15 The Base Practices of the SSE-CMM • The domain dimension consists of all the base practices that collectively define security engineering – Requires the organization to have a formalized security process in place • The capability dimension consists of standard best practices to ensure correct process management – Apply across a wide range of domains – Represents activities that should normally occur while executing security base practices Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 16 The Base Practices of the SSE-CMM • Related base practices are organized into common process areas for ease of use • Process area: distinct collection of related practices with common features • Each process area embodies a set of organizational actions intended to successfully carry out the purposes of base practice – Applies across the lifecycle of the enterprise and does not overlap with other base practices Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 17 The Base Practices of the SSE-CMM • Each process area can be addressed as a distinct entity and can be implemented in multiple contexts throughout an organization and for various products • Satisfying the purpose of the process is the first step in building process capability • The model does stipulate that security objectives are achieved by executing the base practices that underlie each process area Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 18 Project and Organizational Base Practices • Project process areas are an important part of the SSE-CMM – They characterize actions that must be performed to satisfy the generic security practice goals of the standard • Each process area itemizes an explicit set of security activities that have to be carried out for the security engineering process to be considered secure • The next few slides summarize some process areas Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 19 Project and Organizational Base Practices • PA12 - Ensure Quality - to address system quality and the quality of the process used to create the system – Actions specified in this process are used to measure and improve quality • PA13 - Manage Configurations - to maintain the status of all project configurations and to analyze/control changes to the system and its configurations Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 20 Project and Organizational Base Practices • PA14 - Manage Project Risks - to identify, assess, monitor, and mitigate risks to ensure the success of systems engineering activities – And the overall technical effort • PA15 - Monitor and Control Technical Effort contains the activities that control the project’s technical aspects – As well as its systems engineering effort – Activities include directing, tracking, and reviewing the project’s accomplishments, results and risks Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 21 Project and Organizational Base Practices • PA16 - Plan Technical Effort - defines the plans that guide the project – Plans provide the basis for scheduling, costing, controlling, tracking, and negotiating the technical work involved in system engineering • PA17 - Define Systems Engineering Process specifies and manages the organization’s standard system engineering • PA18 - Improve Systems Engineering Process describes continuing activities to measure and improve systems engineering Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 22 Project and Organizational Base Practices • PA19 - Manage Product Line Evolution - ensures that product development efforts achieve their strategic business purposes – Covers the practices associated with managing a product line, but not the product engineering itself • PA20 - Manage Systems Engineering Support Environment - applies to systems engineering support at both the project and organization level – The aim of this area is to maximize support capability Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 23 Project and Organizational Base Practices • PA21 - Provide Ongoing Skills and Knowledge provides training for the organization’s security engineering to ensure that project personnel have the necessary knowledge and skills to achieve objectives • PA22 - Coordinate with Suppliers - to manage work done by other organizations based on a defined process – Other organizations include vendors, subcontractors, and partners Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 24 Assuring an Organization’s System Security Engineering Capability • The SSE-CMM is meant to provide a general set of criteria for security best practice – Can be used to assess the security status of software and system engineering processes • Organizations perform the evaluation by determining the presence or absence of a set of security best practices – The comparison is then used to plan, manage, monitor, control, and improve the security of all technical processes in the 12207-2008 standard Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 25 Assuring an Organization’s System Security Engineering Capability • At the management level – The SSE-CMM generates practical information that allows decision makers to evaluate security of software operation against business needs • The model focuses on process assessment, process improvement, and capability determination • SSE-CMM is useful for supply chain risk assessment – Assurance that a chain of suppliers is functioning properly Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 26 Assuring an Organization’s System Security Engineering Capability • The SSE-CMM’s documentation and its baseline security practices are linked to the concepts in process areas of ISO 12207-2008 • Process domains for systems and software engineering in the SSE-CMM are the same as those covered by 12207: – – – – Acquisition Supply Technical and implementation processes Project, project-enabling, and supporting processes Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 27 Architectural Components of the SSECMM • SSE-CMM implements two hierarchies: – The first consists of the traditional set of process categories, composed of base practices – Processes are then rated in terms of a second “assessment” hierarchy based on capability levels • The base practices represent unique actions taken within the process – Have to be performed in order to achieve the purposes of the process • The model requires an organization to judge whether each practice is being executed correctly Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 28 Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2014 29 Process Capability Assessment • Capability level: the assessed level of competency for the execution of a practice • Capability levels create a way of progressing through the improvement of any given process • The reference model has six levels: – – – – – – Incomplete Performed Managed Established Predictable Optimizing Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 30 Process Capability Assessment • Process maturity: the level of capability of a process based on practices and common features • Escalating levels of process maturity are built on a foundation of increasingly capable practices • Each process maturity level provides a major enhancement in capability from the process provided by its predecessors • The successful satisfaction of a capability level within one process may require the presence of another process Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 31 Process Capability Assessment • The SSE-CMM capability levels: – Incomplete - the process has no easily identifiable work products or outputs – Performed - base practices of the process are generally performed • Their performance might not be rigorously planned and tracked – Managed - performance is planned and tracked, and the organization verifies that practices were performed according to specified procedures Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 32 Process Capability Assessment • The SSE-CMM capability levels (cont’d): – Established - base practices are performed according to a well-defined process using approved, tailored versions of standards and documented processes – Predictable - execution of the process is fully reliable because detailed measures of performance are collected and analyzed – Optimizing - organization establishes goals for determining the effectiveness of quantitative processes based on goals Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 33 Process Capability Evaluations • SSE-CMM processes probably exist at different levels of capability in most organizations • The order of the actions initiated at each capability level is necessary – Certain activities must be performed before other actions can be effective • Common features: correct characteristics of a practice that can be confirmed by observation • The SSE-CMM has common features that address a specific aspect of process implementation Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 34 Process Capability Evaluations • Common features and their required activities provide a baseline for improving process capability • The generic base and organizational practices grouped into each common feature provide a basis for understanding the actions required to achieve a given capability level • If some requirements were not achieved for a common feature at a given capability level: – The assessment shows where the organization is operating at the lowest completed capability level Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 35 Process Capability Evaluations • The capability levels of the SSE-CMM are based on a set of defined base and organizational practices • Organizations can identify an explicit sequence for implementing these practices – But the order is not implicit in the model itself • The capabilities needed for any given process depend on its context – Context influences the degree to which an auditor can compare the overall results of a process maturity assessment with required practice Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 36 Determining Capability Using the SSECMM Assessment Model • The SSE-CMM assessment model can give an organization an overall rating of capability maturity – Or it can provide an assessment of the capability of a specific process instance • A process instance is a unique occurrence of a process – Can be used to ensure repeatability • Practice adequacy is a rating of the extent to which a practice meets its purpose Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 37 Determining Capability Using the SSECMM Assessment Model • The results of practice adequacy assessment support the organization’s overall business requirements – Helps managers decide whether the processes are effective in achieving their goals – Helps identify significant causes of poor quality or time and cost overruns – Helps set priorities for improving the process Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 38 The SSE-CMM Assessment Process • Overall aim of the assessment process is to make an organization’s base practices: – Repeatable – Reliable – Consistent • Base practices enable an organization to take objective measurements of SSE-CMM processes – By stipulating a comprehensive set of activities that indicate capability Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 39 The SSE-CMM Assessment Process • Considerations when using the model to improve security engineering: – How the assessment results are interpreted and applied – How the model’s best practices are implemented as a result of that interpretation – How the implementation is measured and judged to be effective – How the organization can make a business case from the assessment results – How an organization can create and sustain a culture of improving capability and security Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 40 Using Targeted Assessments to Ensure Supplier Capability • Organizations can use the SSE-CMM to determine supplier capability – By comparing perceived risks against potential return on investment • A supplier capability assessment can also provide trust for complex situations and future projects • SSE-CMM helps the customer rate potential suppliers against target capability levels – Customer can see potential gaps in a supplier’s security engineering and other capabilities Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 41 Using Targeted Assessments to Ensure Supplier Capability • A capability assessment can be used to tell: – The supplier what risks are associated with a new project – The customer whether the supplier’s system security engineering is trustworthy • The ability of suppliers and customers to know the above provides them with a major competitive advantage for doing business in a global economy Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 42 Summary • Organizations should perform a set of prescribed activities to ensure that they have secure engineering • Each organization creates a protection to describe the base practices it will assess • Base practices specify the what but not the how of system engineering • In addition to base practices, the other common features of the SSE-CMM are the organizational practices Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 43 Summary • The context and situation are important when defining the actual form of a base practice • An organization can apply a standard process to evaluate its capability maturity in system security engineering • An organization can use the SSE-CMM to determine supplier capability; these determinations can establish trust in a global outsourced environment Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition © Cengage Learning 2015 44