1 / 16

Security SIG in MTS

Security SIG in MTS. Fraunhofer FOKUS Tallinn, 4-5 October 2011 Berlin, 15 December 2011 update. Agenda. Round Call Presentation Collection Introductory Presentation Motivation & „ History “ (Tallinn meeting ) Contribution by Scott Next steps , perspectives :

Télécharger la présentation

Security SIG in MTS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security SIG in MTS Fraunhofer FOKUS Tallinn, 4-5 October2011 Berlin, 15 December 2011 update

  2. Agenda • Round Call • PresentationCollection • IntroductoryPresentation • Motivation & „History“ (Tallinn meeting) • Contributionby Scott • Next steps,perspectives: • Discussionof NWI drafts Security SIG in MTS, 15 December 2011

  3. Security Standardizationbodies • International, e.g. ISO, ITU • European, e.g. ETSI, ENISA • National, e.g. NIST, AFNOR, DIN • Industrial communities, e.g. IEEE, OMG Security SIG in MTS, 4-5 October 2011

  4. Terminology (1): Standards • The Common Criteria for Information Technology Security Evaluation (CC) is the driving force for the widest available mutual recognition of secure IT products. This web portal is available to support the information on the status of the CCRA, the CC and the certification schemes, licensed laboratories, certified products and related information, news and events. • The ISO 27000 series of standards have been specifically reserved by ISO for information security matters. This of course, aligns with a number of other topics, including ISO 9000 (quality management) and ISO 14000 (environmental management). Security SIG in MTS, 4-5 October 2011

  5. Terminology (2): Recommondations • RFC2828 (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. • OUSPG/Codenomicon Glossary of Vulnerability Testinghttps://www.ee.oulu.fi/research/ouspg/Glossary • Threat modeling framework (Trike): http://www.net-security.org/dl/articles/Trike_v1_Methodology_Document-draft.pdf • ETSI ISG on Security indicators (ISI) starting with R2GS Club terminology • … Security SIG in MTS, 4-5 October 2011

  6. Sample terms • Asset: • Anything that has value to the organization (27000). • Entities that the owner of the TOE presumably places value upon (CC). Data, or occasionally a physical object, which is featured in the business Rules of the System. • Attack: • Attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset (27000). • A task which, if it worked, would help accomplish a threat (Trike). … • Control, Continuous Checking, Information Security Risk, Incident, Resilience, Security Event, Security Objective, Security level, … Security SIG in MTS, 4-5 October 2011

  7. Case studiesexperiences Industrialapproaches validated in industry lead case studies, coming from ETSI members, e.g.: ITEA DIAMONDS project case studies: • Smart Cards • Industrial Automation • Radio Protocols • Transport/Automotive • Telecommunication Security SIG in MTS, 4-5 October 2011

  8. TVRA framework - objectives • TVRA is a method for use by ETSI standards developers • undertaking an analysis of the threats, risks and vulnerabilities of a telecommunications system. • Builds from (and complements) the Common Criteria (ISO/IEC 15408). Security SIG in MTS, 4-5 October 2011

  9. TVRA in ETSI technicalcommitees • TISPAN WG7(future WG “Risk management” on Privacy and Security technologies?) • TR 102 165 • part 1, v4.2.3 (2011-03): method and proforma for TVRA • part 2, v4.2.1 (2007-02): Protocol Framework Definition; Security Counter Measures • TR 187 002 v3.1.1 (2011-04): NGN Security • TR 187 014 v2.1.1 (2009-02): eSecurity, user guide to eTVRA • STF 415 Security support to NGN: smart meter • ITS: TR 102 893 v1.1.1 (2010-03):Intelligent Transport Systems; Security: TVRA of 5,9 GHz radio communication in an ITS (vehicle-to-vehicle and vehicle-to-roadside) Security SIG in MTS, 4-5 October 2011

  10. Next steps • Contributions in MTS • Start Special Interest Group (SIG) for “security [testing]” • First meeting 15th December 2011 in Berlin:http://webapp.etsi.org/meetingcalendar/MeetingDetails.asp?mid=13464 • NWI TS focusing on security testing terminology (methodology etc.)? • Similar to ongoing performance testing work • NWI TR focusing on security including industrial case studies? • Similar to ETSI TR 103 168 (Application of Model-Based Testing in the Telecoms Domain) • Collaboration with INT new work item on Security/Benchmarking test plan (using MSF inputs) • Collaboration with TISPAN • TVRA lacks on test methods • Enrichment with (model-based) testing techniques? • Latest news: TC TISPAN final meeting planned for February 2012, new group planned Security SIG in MTS, 4-5 October 2011, updated 15 December 2011

  11. More Steps & Perspectives • Contribution to new ETSI Industrial Specification Group (ISG) on Information Security Indicators (ISI) • Transfer to other international committees (e.g. ISO) • using PAS (public available specification) criteria to • initiate further international NWI (e.g. via DIN) • ETSI members support: FOKUS, Conformiq, TestingTech, Codenomicon, FSCOM, … Security SIG in MTS, 4-5 October 2011

  12. Discussion “security” scope in MTS: • Model / Specification, system risks • Risk Analysis (paper-based) • guidance • “Testing” (to break the system) • Scanning (libs) “known attacks” • Functional / traditional testing • Neg. testing, unknown vul., config mistakes • fuzzing -> product (units,…) • (light) penetration -> system (=deployed product) Security SIG in MTS, 15 December 2011

  13. Discussion (2) LifeCycle Activity Mapping (Slides presented by Ian Bryant) • Risk analysis (refer to e.g. ISO/IEC 27005) • Specification (refer to ISO/IEC SAF SP) • Assurance: what you want to achieve (refer to ISO/IEC 15026) • Verification (refer to ISO/IEC 15408) Security SIG in MTS, 15 December 2011

  14. Discussion (3) Links presented by Ari: • Microsoft Security development lifecycle • Microsoft.com/security/sdl • SSDL Security Testing • bsimm.com/online/ssdl/st • Open Software security model • Opensamm.org Security SIG in MTS, 15 December 2011

  15. Discussion (4) MTS(11)0091 Modelling and design for security (Document presented by Scott) • UML diagrams for basic terms (objectives, requirements) • Role for an extenddTPLan Security SIG in MTS, 15 December 2011

  16. Results Security “plan” in MTS: Three NWIs: • Terminology • “Educational” material • Case study experiences • Security design guide enabling test and assurance (V&V) • To be uploaded online Security SIG in MTS, 15 December 2011

More Related