ISSAP Session 6 Requirements Analysis and Security Standards/Guidelines
630 likes | 650 Vues
This session covers the analysis of design requirements, the value of data, design architecture, understanding information systems security standards and guidelines, and assessing information system security effectiveness.
ISSAP Session 6 Requirements Analysis and Security Standards/Guidelines
E N D
Presentation Transcript
ISSAP Session 6Requirements Analysis and Security Standards/Guidelines 19 September 2011
Requirements • Questions from Session 5 ? • Session 1, 2, 3, &4 handouts are posted on www.silverbulletinc.com/DM2 • Contact Shelton Lee for credentials • Shelton.lee@lmco.com
Requirements • Schedule – Ten Sessions 08/24/2011 Organization08/29/2011 Access Control pg 3-6208/31/2011 Access Control pg 62-117 09/07/2011 Cryptography pg 125-17209/12/2011 Cryptography pg 173-21209/14/2011 Physical Security pg 222-28509/19/2011 Requirements pg 293-35109/21/2011 BCP & DRP pg 357-371 Telecom pt 1 pg 379-399 09/26/2011 Telecomm pt 2 pg 399-44009/28/2011 Review
Requirements • Requirements are critical to the proper assignment of controls to any operation • Key areas are: • Analysis of design requirements • Value of data • Design architecture • Understanding information systems security standards and guidelines • Assessment of information system security effectiveness • Attack vectors
Requirements • Requirements stem from business need and policy • Risk Analysis • Should be conducted • Risks should be mitigated • May be accepted • OCTAVE Operationally Critical Threat, Asset, and Vulnerability Evaluation • NIST SP 800-30 • ISO/IEC 27005
Requirements • Requirements gathering, capture, specification • Capture: spreadsheet, table, database • Products: Rhapsody, DOORS, System Architect, Quality Center • ISSAP should insist on following industry best practices as a measure of due dilligence and ethics
Requirements • Risk Theory • Risk = Vulnerability * threat * Impact Countermeasures • Risk Analysis • Business case • System characterization • Threat Analysis • Vulnerability and Control Analysis • Risk mitigation strategy • Risk Level • Residual Risk
Requirements • Define Requirements • Identify requirements • Verify and validate requirements • Document Requirements • Iterate • Avoid ambiguous, untracable, unusable • Will drive cost up and usability down
Requirements • Attack Vectors • Must be familiar with common types • No single layer is enough • CVE • Firewalls and AV • Zero day • Heuristics • “Vector” refers to method of attack • Not payload • Virus decreasing, trojan and spyware increasing • Single tasking vs multitasking
Requirements • Attack by e-Mail • Generally by attachment • Social engineering: enclosed URL • Combining with spam • Often mistakes in english - Check actual URL (may need to look at source)
Requirements • Attack By Deception • Social engineering • Fraud, scam, hoaxes, virus, worms • Convince people to act out of the ordinary • Slow escalation – innocuous start • Hoaxes • Target ignorance and credulity • May be DOS through multiplication • “send to all your friends” • Damage through deletion
Requirements • Hackers • Term of respect ? • Crackers • Black vs white hat • Unlike code, are flexible and can recognise opportunities • Often use trojans and root kits
Requirements • Web page attack • Counterfeit sites • Redirection • Misspelling • Popup pages can install malware, spyware, adware, trojans. Diallers or scamware • Can close connection then try to dialup
Requirements • Worms • Stand alone program • Virus is a code fragment • Windows DCOM vulnerability • Any remote access service • Many install trojans • Disable
Requirements • Malicious Macros • WORD and Excell Macros • Major issue of 1995 – Melissa • Can turn off now • Macro can do almost anything (usually VB) • Instant messaging, IRC, P2P file sharing • Valuable internally • Not over Internet • Attachments are main problem • Malicious URLs
Requirements • Viruses • Six attributes of malware • Insertion • Activation • Evasion • Replication (virus, worm) • Payload • Eradication • Vectors • E-mail attachments, downloaded files, worms, etc
Requirements • Asset and Data Valuation • Priceless data may be under protected • Unimportant have excess protection • “All data has value and shall be protected in accordance with value” • Context is important • Business Impact Analysis
Requirements • Context and Data Value • Effect of loss • Afford a few days downtime or not • Hot spares • Offsite backup • Corporate vs Departmental • Local priorities vs global • Different colors of money
Requirements • Business, Legal, and Regulatory Req’mts • Healthcare: HIPAA • PCI DSS • Sarbanes Oxley • Gramm-Leach-Biley Act (GLBA) • Federal Information Security Management Act of 2002 • EU • Directive 95/46/EC collection storage disclosure PII • Directive 2002/58/EC cookies, spam, telemarketting • Calif 1386 • MOA/MOU
Requirements • Product Assurance Evaluation Criteria • Orange Book • Part of “rainbow” series • 1984 • D-1 to A-3 rating, C-2 enough for most • ITSEC • European (and Canada) • One less than Common Criteria (E3 ~ EAL4) • Common Criteria • EAL 1-7 (7 highest, 1 “this box is blue”) • EAL 4 most common (no admin/security seperation) • 5 or higher for classified • Driver NSTISSP #11
Requirements • Common Criteria Part 1 • v2.3 ISO/IEC 15408:2005 ISO/IEC 18045/2005 • September 2007, Version 3.1 and Revision 2 (NIB) • Assurance based on evaluation • Profile • Target • Three Sections • Part 1 Introduction and general model • Part 2 Security Functional Requirements • Part 3 Security Assurance Requirements • Defines security profiles and security targets
Requirements • US, France, Germany, UK, Canada 1998 • Maintain Standards • Increase availability of products and profiles • Eliminate duplicate evals • Continuous improvement • 1999 Australia and NZ • Many More • NVLAP National Voluntary Laboratory Accreditation Program – required to be CC test lab • Now National Information Assurance Partnership (NIAP) Approved Common Criteria Testing Laboratories (CCTL)
Requirements • CC Part 2 • Security Functional Components • Target of Evaluation (TOE) must have a set of Security Functional Requirements (SFR) • SFR may include Security Functional Policies (SFP) All SFP are implemented under TOE Security Functionality (TSF). TSF: all hardware software and firmware of a TOE directly or indirectly relied upon for security enforcement
Requirements • Target of Evaluation (TOE) • TOE may be an IT product or a part of one • Software application (SA) • Operating system (OS) • SA in an OS • SA in and OS and a workstation • OS and workstation • Smart Card • Cryptographic coprocessor in a smart card • LAN including all connected devices • Database application without the client software • One famous case of a server that was not connected to a network.
Requirements • EAL overview (table in book) • 1 functionally tested • 2 structurally tested • 3 methodically tested and checked • 4 methodically designed, tested and reviewed • 5 semiformally designed and tested • 6 semiformally verified design and tested • 7 formally verified design and tested
Requirements • There is a long section in the book on the different Common Criteria level detail you will just need to study. • CC Part 3 Assurance Paradigm • Threats need to be clearly articulated • Measures taken to reduce threat and mitigate vulnerabilities • Identify probable future threat vectors and eliminate, mitigate, or notify
Requirements • Significance of Vulnerabilities • Threat agengts will continually seek to find vulnerabilities • Some will acquire the target • Lack of trusted products make it difficult to resist attack and likely attacks will occur • IT breaches come from deliberate attacks • Take steps to • Expose, remove, or neutralize all exercisable vulnerabilities • Minimise by reducing residual risk • Monitor so that an exploit of a weakness will be detected
Requirements • Cause of Vulnerabilities • Many causes: some types • Inadequate requirements • Defects in hardware or software • Poor development standards or design choices • May meet requirements and still have defects • Misconfiguration • Improper controls on configuration
Requirements • CC Assurance • Assurance through active investigation to determine security properties of target • Assurance through Evaluation • Evaluation techniques include: • Analysis and checking of processes and procedures • Checking that P&P are being applied • Analysis of correspondance between TOE design against requirements • Verification of proofs • Analysis of guidance documents • Analysis of functional tests developed and results • Independent functional testing • Analysis for vulnerabilities including flaw hypothesis • Penetration testing
Requirements • CC Evaluation Assurance Scale • Greater assurance stems from greater effort • Goal: minimum effort needed to provide necessary assurance • Increasing level based on: • Scope – Amount of IT product included • Depth – deployed to finer level • Rigor – applied in structured manner
Requirements • CC Evaluation Assurance Scale • List on NIAP web site • Products in test http://www.niap-ccevs.org/in_evaluation/ • Products no longer active • List of available protection profiles • CC Parts 1-3 • Other useful information • Home is now http://www.niap-ccevs.org/
Requirements • ISO/IEC 27000 series • Originally BS 7799 became ISO 17799 • Now ISO 27001/2005 • Information Security Management • Original standard had no certification means 27002 filled gap
Requirements • 27001 • Formulate security controls • Manage security risks vs cost • Compliance with laws and regulations • Implimentation and management of controls • Definition of new security management and governance processes • Identification and clarification of existing security processes • Use by management to determine status • Use by auditors to determine compliance • Use by organization to provide information to custormers and trading partners • Implementation of business enabling information security
Requirements • Software Engineering Institute (SEI) Carnegie Mellon – Capability Maturity Model Key (CMM) Practices v1.1 • Measure of how an organization does development • Superceded by Capability Maturity Model Integration (CMMI) • Request by government and assistance of MITRE • Based on actual practice • Reflects best state of the practise • Reflects needs of individuals performing software process improvement, process assessments, or capability evaluation • Is documented • Publicly available
Requirements • CMM (CMMI) developed by • Performing and observing process assessments and capability evals • Studying non-software organizations • Participating in meetings and workshops • Soliciting and analyzing change requests • Soliciting feedback from industy and government
Requirements • CMM has five levels • Level 1 unstructured/chaotic • Level 2 some processes are repeatable • Planning,tracking, oversight, contracts, QA, CM, process development, definition, training • Level 3 – all processes are repeatable • Organization standard process • Integrated software management • Anticipate and solve problems • Software Product Engineering defined • Analyze system requirements, develop software requirements, develop software architecture, design software, impliment code, integrate code, test • Intergroup cooperation • Peer Reviews
Requirements • CMM Level 4 • Processes must be managed • Quantitative Process Management • Establish and track goals for performance • Software Quality Management • Define goals • Establish plans • Base on needs, customer, and end state
Requirements • CMM Level 5 • Optimization • Continual Improvement • Change management (must be communicated) • Software-related technology innovations • Technology selection • Standard products • Process change management • Define goals • Management sponsorship • Training and incentives • Improvement opportunities identified • Pilots to assess effectiveness
Requirements • Unless flowdown and communications are provided, CMMI level 5 is indistinguishable from level 1.
Requirements • ISO 7498 • Systems Interconnection • Common basis for coordination of standards development • Open Systems Interconnection • Does not specifically address requirements analysis but is needed • Reference model to identify areas needing improvement • Phased transition to OSI standards
Requirements • ISO 7498 Basic reference Model of OSI • Clause 4 – reasons for OSI, defines what is connected, scope of intrconnection, modeling principles • Clause 5 – general nature of reference model: layered, what is layering, principles to describe layers • Clause 6 specific layers • Clause 7 description of layers • Clause 8 description of management aspects of OSI • Clause 9 compliance and consistency with OSI reference model.
Requirements OSI 7 layer stack 7. Application Layer NNTP · SIP · SSI · DNS · FTP · Gopher · HTTP · NFS · NTP · SMPP · SMTP · SNMP · Telnet · DHCP · Netconf · RTP · SPDY · (more) 6. Presentation Layer MIME · XDR · TLS · SSL 5. Session Layer Named Pipes · NetBIOS · SAP · L2TP · PPTP · SOCKS 4. Transport Layer TCP · UDP · SCTP · DCCP · SPX 3. Network Layer IP (IPv4, IPv6) · ICMP · IPsec · IGMP · IPX · AppleTalk 2. Data Link Layer ATM · SDLC · HDLC · ARP · CSLIP · SLIP · GFP · PLIP · IEEE 802.3 · Frame Relay · ITU-T G.hn DLL · PPP · X.25 · Network Switch · 1. Physical Layer EIA/TIA-232 · EIA/TIA-449 · ITU-T V-Series · I.430 · I.431 · POTS · PDH · SONET/SDH · PON · OTN · DSL · IEEE 802.3 · IEEE 802.11 · IEEE 802.15 · IEEE 802.16 · IEEE 1394 · ITU-T G.hn PHY · USB · Bluetooth · Hubs
Requirements • Payment Card Industery Data Security Standard (PCI-DSS) • Anything dealing with credit cards • Control Objectives/PCI DSS Requirements • Build and Maintain a Secure Network • 1. Install and maintain a firewall configuration to protect cardholder data • 2. Do not use vendor-supplied defaults for system passwords and other security parameters • Protect Cardholder Data • 3. Protect stored cardholder data • 4. Encrypt transmission of cardholder data across open, public networks • Maintain a Vulnerability Management Program • 5. Use and regularly update anti-virus software on all systems commonly affected by malware • 6. Develop and maintain secure systems and applications • Implement Strong Access Control Measures • 7. Restrict access to cardholder data by business need-to-know • 8. Assign a unique ID to each person with computer access • 9. Restrict physical access to cardholder data • Regularly Monitor and Test Networks • 10. Track and monitor all access to network resources and cardholder data • 11. Regularly test security systems and processes • Maintain an Information Security Policy • 12. Maintain a policy that addresses information security
Requirements • PCI-DSS • PCI-SSC Security Standards Council • Payment application best practices (PABP) now Payment Application Data Security Standards (PA-DSS) • PCI auditors (PCI DSS QSA) qualified security assessor • QSA on behalf of a PCI council approved consultancy (Big 4) • Small companies may do “self assessment) • Under 80,000 transactions • Self-Assessment Questionnaire (SAQ) • Current version (book) 1.2 (PCI) 2.0
Requirements • Architectural Solutions • Service Oriented Architecture (SOA) • Client-Server Architecture • Distributed Centralized Architecture • Database Architectures • Descibe the functional model includingtypes of data to be processed, bandwith required, and topology • Hub and Spoke, Ethernet, Star, Token Ring, etc • ISSAP must be able to design architecture that will compliment and supports the functional architecture • May require Common Criteria • Best practice involves defense in depth • People, Technology, Operations (include processes and procedures) (and policy)
Requirements • Defense In Depth • Protect • Detect • React • Three primary elements • People • Technology • Operations
Requirements • People • Awareness training • Clearly written policy • Consequence to organization and individual – liability for management • Incentives/rewards (coffee cup)
Requirements • DinD • See figure of layered system Network>Enclave Boundry>Enclave • Enterprise Information Security Architecture • Key component of portfolio
Requirements • Security Architecture Process • Define system use and purpose • Define security architecture components • Define architectural model • Design Security Architecture • Develop System Security Interfaces and Design (detailed) • Once you have architecture • Iterate system security design • Allocate security services • Design security management services • Design transfer services (flow) • Physical/Administrative/Environmental services • Final deliverables
Requirements • Architecture Frameworks • DODAF (thank you Shelton) • Clinger-Cohen Act response • Administered by Off. Of DoD Dep. CIO Enterprise Architecture and Standards Directorate • Led to NATO AF and MoDAF • Zachman Framework • FEAF Federal Enterprise Architectural Framework • TOGAF The Open Group • MoDAF (UK) • NIH EAF • Sherwood Applied Business Security Architecture (SABSA) Framework and Methodology • Service Oriented Modeling Framework (SOMF)