A Data Focussed Approach to Mapping Security Issues to Safety Impacts Dr Robert Oates Private – Rolls-Royce Proprietary Information.

Slides:



Advertisements
Similar presentations
Sachin Rawat Crypsis SDL Threat Modeling.
Advertisements

Bridging the gap between software developers and auditors.
Introduction to Risk Management 26 September 2014 Peter Fowler CPPD.
Risk Management a Case Study DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
COMP8130 and 4130Adrian Marshall 8130 and 4130 Test Management Adrian Marshall.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
City Hall of Iasi Ethics in e-guidance, privacy and security devices Date: Author: Cristina Nucuta.
PRM 702 Project Risk Management Lecture #28
Cyber vs Legislation and Ethics Colonel John Doody Panel Chair.
Effective Requirements Management – an overview Kristian Persson Field Product Manager, Telelogic Asia/Pacific.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
TGDC Meeting, July 2010 Security Considerations for Remote Electronic UOCAVA Voting Andrew Regenscheid National Institute of Standards and Technology
Alaa Mubaied Risk Management Alaa Mubaied
Risk Assessment Richard Newman. Six Phases of Security Process 1. Identify assets 2. Analyze risk of attack 3. Establish security policy 4. Implement.
Practical Threat Modeling for Software Architects & System Developers
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Smart Home Technologies
Chapter 1: Security Governance Through Principles and Policies
Module 7: Designing Security for Accounts and Services.
Presented by Mike Sues, Ethical Hack Specialist Threat Modeling.
Threat Modeling: Employing the 5 Ws Security Series, December 13, 2013 Jeff Minelli Penn State ITS
Database Security Carl J. Hoppe 20 November 2013.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Cybersecurity: Risk Management
Principles Identified - UK DfT -
Security Management in Practice
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
ISSeG Integrated Site Security for Grids WP2 - Methodology
STRIDE to a secure Smart Grid in a hybrid cloud
Threat Modeling - An Overview All Your Data is Mine
Design for Security Pepper.
CMIT100 Chapter 15 - Information.
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
Information Security.
Threat modeling Aalto University, autumn 2013.
Lecture 5. Security Threats
Introduction to Information Security
CPSC 875 John D. McGregor C24.
Off-line Risk Assessment of Cloud Service Provider
A Security Review Process for Existing Software Applications
Security Engineering.
Business Risks of Insecure Networks
Understand Core Security Principles
Risk Assessment Richard Newman
CS 790M Project preparation (I)
High Secured Inter-Cloud Connectivity via Public Networks
Chapter 1: Introduction
Understanding Security Layers
Mitigation Principles PROPOSAL OICA/CLEPA
Cybersecurity Am I concerned?
Luxury Images copyrighted to:
Engineering Secure Software
Designs for Data Integrity, validations, security and controls
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Web Information Systems Engineering (WISE)
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Effective Risk Management in Decision Making Process
Mohammad Alauthman Computer Security Mohammad Alauthman
CS 426 CS 791z Topics on Software Engineering
Engineering Secure Software
CS 426 CS 791z Topics on Software Engineering
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

A Data Focussed Approach to Mapping Security Issues to Safety Impacts Dr Robert Oates Private – Rolls-Royce Proprietary Information

Talk Overview Motivation Safety and Security Interactions and Constraints Integrated Development Processes Our solution Example Technologies Limitations and a call to arms! Private – Rolls-Royce Proprietary Information

Mobile Oil Drilling Platform US Coastguard statement Private – Rolls-Royce Proprietary Information

Safety and Security - Risk Supplier Legal Process Quality escape Corrective Action Supplier Supplier End User Legal Process Private – Rolls-Royce Proprietary Information

Safety and Security - Risk Private – Rolls-Royce Proprietary Information

A Note on Risk Driven Development Identify Risks Analyse Risks Generate Risk Treatment Plan Mitigate Define Mitigations as Requirements Avoid Transfer Accept Quality Process Private – Rolls-Royce Proprietary Information

Risk Driven Design Processes Inputs: i) Organisation: ->What’s our risk appetite? ii) Functional Requirements -> What are we making? Initial Design to Design Principles Threat Intelligence Technical Risk Assessment Risk Treatment Plan Are risks acceptable? Identify Mitigations Update Design Next phase yes no Private - Rolls-Royce Proprietary Information

Safety and Security - Impact Spoofing Misinformation Tampering Faulty Assumptions Causes of Incidents Impacts of Cyber-Attack Repudiation Uncontrolled Change Information Disclosure Unqualified Personnel Denial of Service Uncertainty Escalation of Privilege Private – Rolls-Royce Proprietary Information

Integrated Development Processes Ref: ED202A Private – Rolls-Royce Proprietary Information

Threat Risk model Private – Rolls-Royce Proprietary Information

Threat Risk Model Private – Rolls-Royce Proprietary Information

Mapping Impact Properties for a For every data artefact: What happens if I lose the property of… Properties for a cyber security assessment (Microsoft SDL) Properties for a data safety assessment (SCSC) Integrity Completeness Consistency Format Accuracy Resolution Traceability Timeliness Verifiability Availability Fidelity / Representation Priority Confidentiality Integrity Availability Non-repudiation Authorisation Authentication Disposability / Deletability Sequencing Intended Destination/Usage Accessibility Suppression History Lifetime Private – Rolls-Royce Proprietary Information

Impact Assessment Example Self Reproducing Banking Malware Confidentiality Availability Control Signal Resolution US Coastguard statement Integrity Consistency Accuracy Sequencing Timeliness Availability Fidelity / Representation Private – Rolls-Royce Proprietary Information

Trade-off Example Intended destination/usage Accessibility Traceability Disposability / Deletability Suppression Cryptography Sequencing Timeliness Availability Priority Lifetime Confidentiality Integrity Completeness Consistency Format Accuracy Resolution Sequencing Fidelity / Representation History Integrity Availability Authentication/Authorisation Timeliness Lifetime Private – Rolls-Royce Proprietary Information

Limitations Lack of validation of bridge Data safety scalability No replacement for common sense Private – Rolls-Royce Proprietary Information

Conclusions Potentially useful for elucidating security requirements that conserve safety properties Protecting key properties Mitigations that don’t erode key properties Help! Data Safety Working Group Security informed safety case working group Review the bridge Private – Rolls-Royce Proprietary Information