47
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa Abd El aal Ahmed Whadan 1

Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Embed Size (px)

Citation preview

Page 1: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Adapting Secure Tropos for Security RiskManagement in the Early Phases of

InformationSystems Development

Supervisor: Dr. Galal Hassan

Presented by

Walaa Abd El aal

Ahmed Whadan

1

Page 2: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Outlines1. Problem

2. Introduction

3. Glossary

4. Risk management

5. Risk management process

6. ISSRM Reference model

2

Page 3: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Outlines cont7. Security Modeling language

8. Secure Tropos

9. Method for aligning Tropos and ISSRM

10. Running example

11. Contribution

12. Future Work

3

Page 4: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

ProblemIn this paper we specifically target security risk

management in the early IS development. Thus, we have chosen Secure Tropos which incrementally introduces security concerns from the requirements phases. However, the final analysis of the security concerns takes place only during the design phases.

Therefore by aligning Secure Tropos with the ISSRM reference model, we suggest improvements needed for the SRM in the early (requirements) IS phases.

4

Page 5: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

IntroductionSecurity is a major target for today’s information systems (ISs)

designers. Security modeling languages exist to reason on security in the early phases of IS development, when the most crucial design decisions are made. Reasoning on security involves analyzing risk, and effectively communicating risk-related information.

ISs are also facing an increasing complexity because of their interoperability with other systems and of their operation in open, distributed and mobile environments.

5

Page 6: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

GlossaryTropos is a software development methodology founded

on the key concepts of agent-oriented software development. Specifically, Tropos emphasizes concepts for modeling and analysis during the early requirements phase. This phase precedes the prescriptive requirements specification of the system-to-be. [1]

AOSE introduces an alternative approach in analyzing and designing complex distributed computerized systems , according to which a complex computerized system is viewed as a multiagent system in which a collection of autonomous software agents (subsystems) interact with each other in order to satisfy their design objectives. [2]

Page 7: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Glossary (cont)software requirements engineering is the science and

discipline concerned with establishing and documenting software requirements. They state that it consists of software requirements elicitation, analysis, specification, verification, and management.

software requirements management is “the planning and controlling of the requirements elicitation, specification, analysis, and verification activities.” [3]

Page 8: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Glossary (cont)Abuse frames consider threats to a system from the

viewpoint of a malicious user. We define a threat to be the potential for use of domains in the system to cause harm. [4]

Page 9: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Glossary (cont)Basel II: International Convergence of Capital

Measurement and Capital Standards Basel Committee on Banking Supervision.

SOX: Sarbanes-Oxley Act of 2002. Public Law 107-204 (116 Statute 745) (2002).

Page 10: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Risk management

Risk: the possibility of loss and injury.Risk management: is a methodology, which assesses first “the

potential of future events that can cause adverse affects,” and second, the implementation of strategies that mitigate these risks in a cost-efficient way.

Risk management as life cycle and define it as a process of risk identification, analysis, assessment, resolution, and monitoring.

10

Page 11: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Risk management process

11

1. Context and assets identification.

2. Security objectives to reach.

3. Risk analysis \ assessment.

Risk analysis: (1) identify threats; (2) establish a risk level by determining probability that a threat will occur and the impact if the threat does occur; and finally, (3) identification of controls and safeguards that can reduce the risk to an acceptable level.

EX: errors from human, unauthorized access, malicious software

Page 12: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Risk management process

(cont)

Risk assessment: A process used to identify and evaluate risks and their potential effects.

4. Security requirement definition.

5. Controls selection.

6. Controls implementation.

12

Page 13: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Risk management (cont)

There are more than 200 risk management methods making it a challenge to select the most adequate one.

In a previous analysis, we identified some important points for possible improvements.

Firstly, elements are related to the nature of the artifacts produced with such methods. These artifacts are largely informal and typically consist of natural language documents, complemented with tables and ad hoc diagrams for structuring the information.

Secondly, they are often designed for assessing the way existing systems handle risk in an auditing mode.

13

Page 14: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Risk management (cont)

This view is no longer sustainable in the context of today's ISs that need to constantly adapt to new environments and handle evolution with minimum human intervention.

This is an additional argument for the use of more formal languages supporting the reasoning, evolution, monitoring and traceability of risk related information.

The risk management does not only support security officers in the handling of security vulnerabilities but it also provides a framework that allows evaluation of the return on investment of the security solutions against the economic and business consequences of not implementing them.

14

Page 15: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Risk management (cont)

security RM is paramount because it helps companies adopt cost-effective security measures.

1. Every technological security solution has a cost.

2. Companies have limited resources.

companies want to make sure that they adopt only solutions for which Return on Investment (ROI) is positive. This is done by comparing the cost of a solution with the risk of not using it, e.g. the cost of a business disruption due to a successful security attack.

15

Page 16: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Core concepts of ISSRM conceptual model [5]

Page 17: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

The ISSRM Reference model

17

Page 18: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

The ISSRM Reference model (cont)

An asset is anything that has value to the organization and is necessary for achieving its objectives.

A business asset describes information, processes, capabilities and skills inherent to the business and core mission of the organization, having value for it. business assets like a database where information is stored.

A security criterion characterizes a property or constraint on business assets describing their security needs, usually for confidentiality, integrity and availability.

18

Page 19: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

The ISSRM Reference model (cont)

Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities, or processes.

Integrity is the property of safeguarding the accuracy and completeness of assets. Accuracy could be threatened by (unauthorized or undesirable) update or tampering. Completeness could be threatened by altering or deletion.

Availability is the property of being accessible and usable upon demand by an authorized entity.

19

Page 20: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

The ISSRM Reference model (cont)A risk is the combination of a threat with one or more

vulnerabilities leading to a negative impact harming the assets. An impact describes the potential negative consequence of a

risk that may harm assets of a system or an organization, when a threat (or the cause of a risk) is accomplished.

An event is the combination of a threat and one or more vulnerabilities.

A vulnerability describes a characteristic of an IS asset or group of IS assets that can constitute a weakness or a flaw in terms of IS security.

20

Page 21: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

The ISSRM Reference model (cont)A threat characterizes a potential attack or incident, which

targets one or more IS assets and may lead to the assets being harmed.

A threat agent is an agent that can potentially cause harm to IS assets.

An attack method is a standard means by which a threat agent carries out a threat.

A risk treatment is an intentional decision to treat identified risks.

security requirement is the refinement of a treatment decision to mitigate the risk.

Controls (countermeasures or safeguards) are designed to improve security, specified by a security requirement, and implemented to comply with it.

21

Page 22: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

The ISSRM Reference model (cont)

1-The risk management process is iterative.

2- Each step can be repeated to obtain an outcome of higher quality.

3- after determination of the security controls new risks, that overcome or are not addressed by these security controls, can emerge.

22

Page 23: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

The ISSRM Reference model (cont)

risk assessment one elicits which risks are harming assets and threatening security objectives. Once risk assessment is performed, decisions about.

risk treatment are taken. Decisions might include risk avoidance, risk reduction.

Security requirements on the IS can thus be determined as security solutions to mitigate the risks.

security controls, i.e. system specific countermeasures, which are implemented within the organization.

23

Page 24: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Secure Tropos

Tropos spans in all the development stages using the same concepts.

It is easily extensible and it is more security-aware than other agent oriented software.

In addition, the Tropos methodology is well integrated with other approaches, such as the UML, in which some security work has taken place and therefore existing work can be considered and incorporated within the proposed approach.

The modeling concepts of Tropos are well suited to model security requirements, which are usually expressed using notions such as high level goals such as confidentiality and authentication.

24

Page 25: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Secure Tropos (cont)

25

Secure Tropos enriches a set of Tropos constructs (actor, goal, soft goal, plan, resource, and belief ) with security constructs such as security constraint, and threat.

Page 26: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Secure Tropos (cont)

Constraints can represent a set of restrictions that do not permit specific actions to be taken or prevent certain objectives from being achieved.

A security constraint represents a restriction related to security that the system must have and actors must respect.

A threat “represents circumstances that have the potential to cause loss or problems that can put in danger the security features of the system”.

A hard goal or simply goal hereafter represents an actor’s strategic interests.

A soft goal unlike a goal, does not have clear criteria for deciding whether it is satisfied or not and therefore it is subject to interpretation.

26

Page 27: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Secure Tropos (cont)

27

A secure dependency introduces security constraint(s) that must be fulfilled for the dependency to be satisfied. Both the depender and the dependee must agree for the fulfillment of the security constraint in order for the secure dependency to be valid. That means the depender expects from the dependee to satisfy the security constraint(s) and also that the dependee will make an effort to deliver the dependum by satisfying the security constraint(s).

Page 28: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Secure Tropos (cont)

The goal model allows a deeper understanding of how the actors reason about goals to be fulfilled, plans to be performed and available resources The goal model uses the means-ends, decomposition and contribution relationships.The means-ends relationship permits to link a means (plan/goal/resource) with an end (goal). The decomposition relationship permits to define a finer structure of a plan.

28

Page 29: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Secure Tropos (cont)

contribution link describes a positive or negative impact that one element has on another. To facilitate security analysis Secure Tropos introduces restricts and attacks.

The restricts relationship describes how goal achievement is restricted by security constraints.

The attacks link shows what is the target of an attacker’s plan.

29

Page 30: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Method for Aligning Secure Tropos and ISSRM

30

Page 31: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Running Example

The eSAP is an IS to support integrated assessment of the health and social care needs of elderly. It is based on the Single Assessment Process, which is part of the National Service Framework for Older People Services of the English Department of Health.

The eSAP is suitable to demonstrate our work for two main reasons:

1. security and risk are two important factors in its development and implementation.

2. the security of the system have been successfully analyzed using the Secure Tropos methodology.

31

Page 32: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Running Example (cont)Context and asset identification.

32

information held by the eSAP system. As the information is a valuable businessasset, achievement of the goal Collected care information is restricted by a security constraint assuring that the consent has to be obtained before the personal information can be sent.

Page 33: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Running example(cont)

33

The goal Collected care information can be achieved by executing the plan Collect info about treatment, which needs to gather the Patient personal information and to perform the Manage care plan

Page 34: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Running example (cont)

34

Security objective determination. The plan Check data for consent contributes positively to the security constraint Share info only if consent obtained (Fig. 5). This plan also realizes the goal Consent has been obtained. In our example we strive for privacy of the Patient personal information, thus the goal Consent has been obtained takes part in the decomposition of the plan Perform authorization checks. The latter plan is the means to fulfill the goal System privacy ensured and contributes positively to the security constraint Keep system data privacy.

Page 35: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Running example (cont)

35

We identify an Authentication attack (modeled using the threat construct). Itdescribes a situation where a threat agent fakes his identity to pass himself offas a trusted actor in order to damage the business assets(e.g., Patient personalinformation). The Authentication attack has a negative impact on Privacy

Page 36: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Running example (cont)

36

we present the view of an Attacker whose aim is to get the Patient personal information. The plan is decomposed into two parts: (I) the attacker has to get the consent for the Patient personal information; and (ii) he needs to find the authentication code for the system. To get the consent, the attacker can Steal data from a social worker or Buy data from the untrusted social worker.

Page 37: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Running example (cont)

Risk treatment. Several risk treatment decisions are suggested, the example we apply goal/plan substitution, meaning that we choose different goals to be fulfilled and plans to be executed to mitigate the risk. This produces a different system design but allows avoiding the Authentication attackSecurity requirements definition. The next step is the elicitation of the countermeasures that help to mitigate the actual risk.

To realize the countermeasure, Encrypt data and Decrypt data are performed at a certain time.

37

Page 38: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Running example (cont)

38

Control selection and implementation. This step takes place after controls are defined, that usually happens during the design phase.

Page 39: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Contribution

39

Page 40: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Contribution

Asset-related concepts describe what assets are important to protect, and what criteria guarantee asset security

Risk-related concepts present how the risk itself is defined, and what major principles should be taken into account when defining the possible risks

Risk treatment-related concepts describe what decisions, requirements and controls should be defined and implemented in order to mitigate possible risks

40

Page 41: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Future WorkThe alignment suggests a number of improvements for Secure

Tropos in the context of security risk management activities:

Secure Tropos has to provide guidelines as to when and how to use each constructs in order to avoid misinterpretations of the ISSRM concepts. One improvement could be inclusion of tags in the label of a construct. For Example [BS] could indicate business assets; [IS]– IS assets; [Th]– threat; and [SR]– security requirements.

41

Page 42: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

Future Work (cont)

The semantics of individual modeling constructs should be adapted so that they adequately represent ISSRM concepts. For example a possible improvement by introducing vulnerable points in the modeled IS. But some future research is needed to answer if a relationship between vulnerable points and belief is possible.

Secure Tropos could be improved with additional constructs to better cover the concepts of ISSRM. Fig. 9 indicates that several concepts such as risk, risk treatment, and control are not in the Secure Tropos approach.

42

Page 43: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

References

1. Mayer, N., Heymans, P., Matuleviˇcius, R.: Design of a Modeling Language for Information System Security Risk Management. In: Proceedings of the 1st International Conference on Research Challenges in Information Science (RCIS 2007), pp. 121–131 (2007).

3. Requirements Engineering for Survivable Systems, Nancy R. Mead September 2003 Networked Systems Survivability

43

Page 44: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

1. The Tropos Metamodel and its Use Angelo Susi, Anna Perini and John Mylopoulos ITC-irst, Via Sommarive, 18, I-38050 Trento-Povo, Italy Paolo Giorgini Department of Information and Communication Technology University of Trento, via Sommarive 14, I-38050 Trento-Povo, Italy Informatica 29 (2005) 401–408

44

Page 45: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

2. Mouratidis, H., Giorgini, P.: Secure Tropos: A Security-oriented Extension of the Tropos Methodology. International Journal of Software Engineering and Knowledge Engineering (IJSEKE) 17(2), 285–309 (2007).

45

Page 46: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

4) Lin, L., Nuseibeh, B., Ince, D., Jackson, M.: Using Abuse Frames to Bound the Scope of Security Problems. In: Proceedings of the 12th IEEE international Conference on Requirements Engineering (RE 2004), pp. 354–355. IEEE Computer Society, Los Alamitos (2004)

46

Page 47: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development Supervisor: Dr. Galal Hassan Presented by Walaa

5. Design of a Modelling Language for Information System Security Risk Management

47