CII badging program for ONAP ONAP security committee Stephen Terrill

Slides:



Advertisements
Similar presentations
Effective Design of Trusted Information Systems Luděk Novák,
Advertisements

The Open Source Security Myth — And How to Make it A Reality Michael Davis Dynamic Security Concepts, Incorporated Track 3, 1300 Sunday, 1 August 2004.
1Copyright © 2005 InfoGard Laboratories Proprietary 2005 Physical Security Conference Physical Security 101 Tom Caddy September 26, 2005.
Software Quality Assurance Inspection by Ross Simmerman Software developers follow a method of software quality assurance and try to eliminate bugs prior.
1 Test Planning CSSE 376, Software Quality Assurance Rose-Hulman Institute of Technology March 9, 2007.
Computer Security: Principles and Practice
High Level: Generic Test Process (from chapter 6 of your text and earlier lesson) Test Planning & Preparation Test Execution Goals met? Analysis & Follow-up.
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
DRAFT Richard Chandler-Mant – R Consultant The Challenges of Validating R Managing R in a Commercial Environment.
Is Open Source Software a viable option for private and public organizations? Anthony W. Hamann Tuesday, March 21, 2006.
Introduction to RUP Spring Sharif Univ. of Tech.2 Outlines What is RUP? RUP Phases –Inception –Elaboration –Construction –Transition.
Information Systems Security Computer System Life Cycle Security.
A Framework for Automated Web Application Security Evaluation
© 2012 IBM Corporation Rational Insight | Back to Basis Series Chao Zhang Unit Testing.
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
Microsoft Security Development Lifecycle
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Community Codes Free and shared resource Ongoing distributed development by both research and operational communities – Maintained under version control.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts.
Version 02U-1 Computer Security: Art and Science1 Correctness by Construction: Developing a Commercial Secure System by Anthony Hall Roderick Chapman.
Design Principles and Common Security Related Programming Problems
Risk Identification and Risk Assessment
By Ramesh Mannava.  Overview  Introduction  10 secure software engineering topics  Agile development with security development activities  Conclusion.
The NIST Special Publications for Security Management By: Waylon Coulter.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Software Engineering Process - II 7.1 Unit 7: Quality Management Software Engineering Process - II.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
ONAP security meeting
*OSS=Open source software
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
ONAP security meeting
ONAP security meeting
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
ONAP security meeting
ONAP security meeting
Cloud Security– an overview Keke Chen
CII Badging Program for CLAMP Xue Gao, Pierre Close, Anael Closson
Chapter 18 Maintaining Information Systems
Quality Assurance: Early Work Items
ONAP security meeting
Chapter 8 – Software Testing
Topics Introduction Structure and way of working
^ About the.
FEASIBILITY STUDY Feasibility study is a means to check whether the proposed system is correct or not. The results of this study arte used to make decision.
Website update and service integration tool
ONAP Security Sub-committee Update
CMMI – Staged Representation
Setting Actuarial Standards
HIGHLIGHTING THE KEY CHANGES
Nessus Vulnerability Scanning
Chapter 19: Building Systems with Assurance
Open Source Share, and be rewarded tenfold ….
IS Risk Management Report (Template)
Software Requirements Specification (SRS) Template.
Helping you make your code better
What is a CA document? Date: Authors: March 2005 March 2005
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IT OPERATIONS Session 7.
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Chapter 7 Software Testing.
Proposal on TSC policy for ONAP release Maintenance
Can Embeddings Detect Heartbleed?
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
What Does it Mean to Get Gold in CII Badging?
ONAP Security Requirements ONAP Virtual F2F, December overall requirements - security by design Stephen Terrill, et al.
Collaborative Security: Securing Open Source Software
Presentation transcript:

CII badging program for ONAP ONAP security committee Stephen Terrill 21 Julne , 2017

Summary The ONAP vulnerability procedures have been approved, now the security committee is looking into the pro-active activities. CII (core infrastructure initiative) has been created by the linux foundation in response to previous security issues in open-source projects (Heartbleed in openSSL). The CII has created a badging program to recognize projects that follow a set of identifies best practices that could be adopted. There are three levels passing, silver and gold. The security sub-committee has looked at these and feels that given ONAP is managing core critical infrastructure, the ONAP projects should follow the gold level. A stepwise introduction is proposed.

CII badging program Defines a set of best practices for Free/Libre and Open source Software. It defines 3 levels: Passing, Silver and Gold. Encourage projects to follow the best practices Help new projects discover what those practices are Hel users know which projects are following the best practices. Passing criteria covers general project aspects with higher level of security practices described in silver and Gold levels. Individual projects apply for the badging. Basic introduction can be found here: https://github.com/coreinfrastructure/best-practices- badge/blob/master/doc/criteria.md Silver/Gold criteria can be found here: https://github.com/coreinfrastructure/best-practices- badge/blob/master/doc/other.md

Example criteria Gold: Passing: Silver The project website MUST succinctly describe what the software does (what problem does it solve?). The project MUST use at least one automated test suite that is publicly released as FLOSS (this test suite may be maintained as a separate FLOSS project). Silver The project MUST document what the user can and cannot expect in terms of security from the software produced by the project. The project MUST identify the security requirements that the software is intended to meet and an assurance case that justifies why these requirements are met. The assurance case MUST include: a description of the threat model, clear identification of trust boundaries, and evidence that common security weaknesses have been countered Gold: The project MUST have at least 50% of all proposed modifications reviewed before release by a person other than the author, to determine if it is a worthwhile modification and free of known issues which would argue against its inclusion.

CII Badging Scope and Sample Requirement Areas General Project Areas Project description, OSS licensing, documentation, website, support TLS, change control, unique version numbering, release notes Reporting Bug-reporting process, vulnerability report process Quality Maintain golden source for rebuilding, use common tools, automate test suite, perform new-functionality testing, address compiler warning flags Security Developers security knowledgeable, use good cryptographic practices, protection against man-in-the- middle (MITM) attacks, fix publicly known vulnerabilities, don’t leak valid private credential Analysis Perform static code analysis, perform dynamic code analysis, fix vulnerabilities

CII badging considerations The basic level also covers aspects that would be considered as required by the release. ONAP is critical infrastructure software. Better to start early

Proposal ONAP strives for all projects included in a release meet the gold level of the CII badging program ONAP is critical infrastructure software As such, should not be happy with software that is not tight on security. Review the ONAP release planning considering the badging program best practices. Organize CII badging program presentation for PTLs (from David Wheeler) Start with 2 projects (July), scale to the rest of the projects (August).