Costing Secure Systems Workshop

Slides:



Advertisements
Similar presentations
Roadmap for Sourcing Decision Review Board (DRB)
Advertisements

MODELING THE TESTING PROCESS Formal Testing (1.0) Requirements Software Design Risk Data Approved, Debugged, Eng. Tested Code Automated Test Tools Tested.
Software Engineering CSE470: Process 15 Software Engineering Phases Definition: What? Development: How? Maintenance: Managing change Umbrella Activities:
Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
Requirements Engineering n Elicit requirements from customer  Information and control needs, product function and behavior, overall product performance,
Stepan Potiyenko ISS Sr.SW Developer.
FAA Information Technology- Information Systems Security R&D Workshop June 2015© USC-CSE Extending COCOMO II to Estimate the Cost of Developing.
March 2002 COSYSMO: COnstructive SYStems Engineering Cost MOdel Ricardo Valerdi USC Annual Research Review March 11, 2002.
University of Southern California Center for Software Engineering CSE USC COSYSMO: Constructive Systems Engineering Cost Model Barry Boehm, USC CSE Annual.
11/08/06Copyright 2006, RCI1 CONIPMO Workshop Out-brief 21 st International Forum on COCOMO and Software Cost Modeling Donald J. Reifer Reifer Consultants,
University of Southern California Center for Software Engineering CSE USC ©USC-CSE 10/23/01 1 COSYSMO Portion The COCOMO II Suite of Software Cost Estimation.
Avra Software CMPUT Process Quality and Software Assessment Case Study - slide#1©P. Sorenson and Amr Kamel Assessment Plan for Assessment Plan for.
Welcome and Overview: COCOMO / SCM #20 Forum and Workshops Barry Boehm, USC-CSE October 25, 2005.
System-of-Systems Cost Modeling: COSOSIMO July 2005 Workshop Results Jo Ann Lane University of Southern California Center for Software Engineering.
Estimating System of Systems Engineering (SoSE) Effort Jo Ann Lane, USC Symposium on Complex Systems Engineering January 11-12, 2007.
University of Southern California Center for Software Engineering CSE USC 9/14/05 1 COCOMO II: Airborne Radar System Example Ray Madachy
©2011 Rolls-Royce plc The information in this document is the property of Rolls-Royce plc and may not be copied or communicated to a third party, or used.
COSOSIMO* Workshop Outbrief 14 March 2006 Jo Ann Lane University of Southern California Center for Software Engineering CSE.
April 27, 2004CS WPI1 CS 562 Advanced SW Engineering Lecture #3 Tuesday, April 27, 2004.
COMP8130 and 4130Adrian Marshall 8130 and 4130 Test Management Adrian Marshall.
University of Southern California Center for Systems and Software Engineering © 2009, USC-CSSE 1 An Analysis of Changes in Productivity and COCOMO Cost.
Defining the Activities. Documents  Goal Statement defines why helps manage expectations  Statement of Work what gets delivered defines scope  Software.
Information System Economics Software Project Cost Estimation.
COCOMO-SCORM: Cost Estimation for SCORM Course Development
Dillon: CSE470: SE, Process1 Software Engineering Phases l Definition: What? l Development: How? l Maintenance: Managing change l Umbrella Activities:
ESD web seminar1 ESD Web Seminar February 23, 2007 Ricardo Valerdi, Ph.D. Unification of systems and software engineering cost models.
Requirements Analysis
After Lesson 6 next is Lesson 13 to fit topic on Software Development SOFTWARE PROJECT MANAGEMENT.
Implementing QI Projects Title I HIV Quality Management Program Case Management Providers Meeting May 26, 2005 Presented by Lynda A. O’Hanlon Title I HIV.
Background Management Council (MC) was briefed on approach in early Feb 2003 and approved it Agreed that every Service Group (SG) will participate in.
© USC-CSE 2001 Oct Constructive Quality Model – Orthogonal Defect Classification (COQUALMO-ODC) Model Keun Lee (
University of Southern California Center for Software Engineering C S E USC Using COCOMO for Software Decisions - from COCOMO II Book, Section 2.6 Barry.
Georgia Institute of Technology CS 4320 Fall 2003.
Cost Estimation What is estimated? –resources (humans, components, tools) –cost (person-months) –schedule (months) Why? –Personnel allocation –Contract.
@2002 Copyright, Itreya Technologies CMMI kick off July 2005.
Review of Software Process Models Review Class 1 Software Process Models CEN 4021 Class 2 – 01/12.
JRA Execution Plan 13 January JRA1 Execution Plan Frédéric Hemmer EGEE Middleware Manager EGEE is proposed as a project funded by the European.
Introduction to Software Project Estimation I (Condensed) Barry Schrag Software Engineering Consultant MCSD, MCAD, MCDBA Bellevue.
University of Southern California Center for Systems and Software Engineering © 2010, USC-CSSE 1 Trends in Productivity and COCOMO Cost Drivers over the.
Unit – I Presentation. Unit – 1 (Introduction to Software Project management) Definition:-  Software project management is the art and science of planning.
Project Planning Goal 1 - Estimates are documented for use in tracking and planning project. Goal 2 - Project Activities and commitments planned and documented.
Estimation Questions How do you estimate? What are you going to estimate? Where do you start?
Project Cost Management
Sample Fit-Gap Kick-off
Software Estimating Technology: A Survey
COCOMO III Workshop Summary
Testing Process Roman Yagodka ISS Test Leader.
Software Planning Guidelines
Project Management and Information Security
PROJECT LIFE CYCLE AND EFFORT ESTIMATION
Chpter#5 -part#1 Project Scope and Human Resource Planning
Tutorial: Software Cost Estimation Tools – COCOMO II and COCOTS
2006 Annual Research Review & Executive Forum
Defining the Activities
CMMI – Staged Representation
Constructive Cost Model
COCOMO II Security Extension Workshop Report
Costing Secure Systems Workshop Report
Software Systems Cost Estimation
COCOMO Model Basic.
More on Estimation In general, effort estimation is based on several parameters and the model ( E= a + b*S**c ): Personnel Environment Quality Size or.
Inspection and Review The main objective of an Inspection or a Review is to detect defects. (Not for Giving Alternative Solutions) This activity and procedure.
Project Management Process Groups
COCOMO Models.
Engineering Processes
Working Group Meeting Report
University of Southern California Center for Software Engineering
Center for Software and Systems Engineering,
Executive Project Kickoff
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

Costing Secure Systems Workshop Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Costing Secure Systems Workshop Edward Colbert, Danni Wu Yue Chen 5th Workshop on Costing Secure Systems USC CSE Annual Research Review 2004 © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Goal Of Workshop  Review proposed Model for costing development of secure systems Extensions to COCOMO II for development of secure software systems Feedback on behavior analysis Validate proposed models Identify research opportunities Kick-off Delphi process Review possible approaches & forms Identify data sources   © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Participants Ed Colbert, USC, Moderator (ecolbert@cse.usc.com) Barry Boehm, USC, Guru (boehm@cse.usc.com) Cheryl Jones, US Army (cljones@pica.army.mil) Clate Stansbury, MCR (cstansbury@mcri.com) Danni Wu, USC (danwu@usc.edu) David Seaver, Price Systems (david.seaver@pricesystems.com) Lee Bergstrom, Lockheed Martin Management & Data System (lee.bergstrom@lmco.com) Paul Stelling, Aerospace Corp. (stelling@aero.org) Sachin Shaw, USC (sachsh@cse. usc.edu) Sherman Paskett, General Dynamics Decision Systems (sherman.paskett@gd-decisionsystems.com) Winsor Brown, USC, Camera Man (awbrown@cse.usc.edu) Yue Chen, USC (yuec@cse.usc.edu) © 2002-4 USC-CSE 18 January 2019

Highlights Project Schedule Early Estimation Model Work-Breakdown Structure (WBS) Common Criteria & Security Objectives COCOMO Security Extension Delphi Collection Approach Issues To Do © 2002-4 USC-CSE 18 January 2019

Cost Model for System Security Increment 1 (Feb – July ’04) Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Cost Model for System Security Increment 1 (Feb – July ’04) Task Element Activities 1. Develop Early Estimation Model Prototype model 2. Sources of Cost Identify, define, scope sources of cost Relate sources of cost to FAA WBS Recommend type of CER for each 3. Secure Product Taxonomy Identify, define, scope product elements 4. COCOMO II Security Extensions Refine model form and data definitions 5. COCOTS Security Extensions Explore security aspects in COCOTS data collection © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Cost Model for System Security Increment 2 (Aug ’04 – July ’05) Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Cost Model for System Security Increment 2 (Aug ’04 – July ’05) Task Element Activities 1. Develop Early Estimation Model Experimental use & refinement 2. Sources of Cost Prioritize sources of cost needing CER’s Refine, prototype, experiment with top-priority CER’s Relate to scope of COCOMO II security extensions 3. Secure Product Taxonomy Experimental use, feedback, and refinement 4. COCOMO II Security Extensions Refine, scope, form, definitions based on results of Tasks 1-3 Experimentally apply to pilot projects, obtain usage feedback 5. COCOTS Security Extensions Develop initial scope, form, definitions based on results of Tasks 1-4 © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Cost Model for System Security Increment 3 (Apr ’05 – Sep ’06) Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Cost Model for System Security Increment 3 (Apr ’05 – Sep ’06) Task Element Activities 1. Develop Early Estimation Model Evolution; integration with other models 2. Sources of Cost Refine sources of cost, CER’s based on usage feedback Integrate with other models Address lower-priority CER’s as appropriate 3. Secure Product Taxonomy Monitor evolution 4. COCOMO II Security Extensions Baseline model definitions Collect project data Develop initially calibrated model; experiment and refine 5. COCOTS Security Extensions Experimentally apply to pilot projects Refine, baseline based on usage feedback © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Highlights Project Schedule Early Estimation Model Work-Breakdown Structure (WBS) Common Criteria & Security Objectives COCOMO Security Extension Delphi Collection Approach Issues To Do © 2002-4 USC-CSE 18 January 2019

Formula for Cost of System & of Security Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Formula for Cost of System & of Security Etotal = EInitial/Mission Analysis + EInvestment Analysis + ESystem Engineering + EDev & Imp + ESys of Sys Integration + Einstall/deployment + EO&M + EDisposal EDev & Imp = Edesign & build HW + Edesign & build SW + Epurchased services + ECOTS-Sys Etotal (Security) = Etotal (with sec) – Etotal (without sec) COTSYS  Commercial of the Shelf Systems © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Formula Elements & COCOMO Family Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Formula Elements & COCOMO Family Formula Elements COCOMO Family Member ESystem Engineering COSYSMO (new) Edesign & build SW COCOMO-II COCOTS ESys of Sys Integration COSoSIMO (new) © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Draft Model of Cost Distribution System Purchase Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Draft Model of Cost Distribution System Purchase Distribution depends on type system acquired # systems affects Installation O&M Disposition After 1st, costs are less Example: $1M System Numbers for show only CORE of this model is for SW © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Draft Model of Cost Distribution System Development Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Draft Model of Cost Distribution System Development Distribution depends on type system acquired # systems affects Installation O&M Disposition After 1st, costs are less Example: $1M System Numbers for show only CORE of this model is for SW © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Draft Model of Cost Distribution System Development with COTS Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Draft Model of Cost Distribution System Development with COTS Distribution depends on type system acquired # systems affects Installation O&M Disposition After 1st, costs are less Example: $1M System Numbers for show only CORE of this model is for SW © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Draft Model of Cost Distribution Services Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Draft Model of Cost Distribution Services Distribution depends on type system acquired # systems Affects Implementation O&M Disposition After 1st, costs are less Example: $1M System Numbers for show only CORE of this model is for SW © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Cost Model for Secure System Approach Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Cost Model for Secure System Approach Identify major sources of cost To Develop Own Including Facilities Equipment People Acquired Systems Services © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 How to Estimate Costs? Costing Approaches Activity Models Unit Costing Analogy Base Parametric For each source of cost, identify appropriate means Cost Estimation Relation (CER) © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Cost Estimation Relations (CER) Example Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Cost Estimation Relations (CER) Example Sample Activity Preparation for Training Classroom Training Periodic Training on new procedures Software Development CER Activity–based Unit costing Analogy-based Parametric Rule 10-20 hours for each Class Hour N trainers total M trainees It cost us $XXX last year,… COCOMO II © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Highlights Project Schedule Early Estimation Model Work-Breakdown Structure (WBS) Common Criteria & Security Objectives COCOMO Security Extension Delphi Collection Approach Issues To Do © 2002-4 USC-CSE 18 January 2019

FAA Acquisition & Standard WBS Analyzed FAA WBS to identify where security will affect activities David Seaver pointed not clear where Analysis of Security Issues related to data management fits Started study Standard WBS © 2002-4 USC-CSE 18 January 2019

Highlights Project Schedule Early Estimation Model Work-Breakdown Structure (WBS) Common Criteria & Security Objectives COCOMO Security Extension Delphi Collection Approach Issues To Do © 2002-4 USC-CSE 18 January 2019

Map Security Objectives with Common Criteria Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Map Security Objectives with Common Criteria Updates © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Highlights Project Schedule Early Estimation Model Work-Breakdown Structure (WBS) Common Criteria & Security Objectives COCOMO Security Extension Delphi Collection Approach Issues To Do © 2002-4 USC-CSE 18 January 2019

COCOMO II Security Driver (SECU) Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 COCOMO II Security Driver (SECU) Viewpoints Design & Development for Security Operational Security Physical Security (Development Constraints) Driver Ratings Nominal High Very High Extremely High Sky High Stratospheric Sky High (or Super High) Stratospheric (or Ultra High) New COCOMO Levels © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Effect Of Security On COCOMO II Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Effect Of Security On COCOMO II Security functional requirements add to project’s KSLOC’s Many systems add Security Manager or Authorization– & Access-Controller “Core Application” adds code to do support authorization & access checks PMtotal = PMtrusted + PMapplication © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Example of COCOMO Security Extension Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Example of COCOMO Security Extension Assume: Application 1000 KSLOC SECU (App) = Nominal Trusted SW 10 KSLOC SECU (trusted) = High SF = 1 All Multipliers (except Security) = 1 (Nominal) SECU Values Nominal = 1 High = 2 VH = 3 EH = 4 SH = 6 Strat = 7 Then PM (total) = 2.94 * (PM (Trusted) + PM (App)) = 2.94 * (10 * SECU(Trusted)) + (1000 * SECU(App)) = 2.94 * ((10 * 2) + (1000 * 1)) = 2.94 * 1020 Effort in Person Month SF: Scale Factors (5) EM: Effort Multipliers(17) © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Number of Security Drivers Issue Current model Add 1 driver that addresses security from 3 viewpoints Development Operational Physical (Development Constraints) Alternative: 2 drivers Security Functions or Objectives Security Assurance Need further research © 2002-4 USC-CSE 18 January 2019

Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 Effect Of Security On COCOMO II (cont.) Relations to Existing Drivers Pre-Workshop If Security driver rating is >= high & following drivers must be > Nominal PREC Precedence (team done similar systems) PMAT Process Maturity TEAM Team Cohesion RELY Required software reliability CPLX Product complexity DOCU Documentation match to life-cycle needs SITE Multi-site development TOOL Use of software tools ACAP Analyst Capability PCAP Programmer Capability Etc. © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

Effect Of Security On COCOMO II (cont Effect Of Security On COCOMO II (cont.) Refined Relations to Existing Drivers Attendees thought best to treat “Clashes” as risk e.g. Precedence (PREC) Security > High  Project = high risk if PREC < High, and ACAP, PCAP & APEX < High Need further investigation for Security levels above Highs © 2002-4 USC-CSE 18 January 2019

Effect Of Security On COCOMO II (cont Effect Of Security On COCOMO II (cont.) Refined Relations to Existing Drivers For Scale Factors: Need to consider how much security drives entire project Cannot easily assign different values to Trusted Non-trusted software © 2002-4 USC-CSE 18 January 2019

Highlights Project Schedule Early Estimation Model Work-Breakdown Structure (WBS) Common Criteria & Security Objectives COCOMO Security Extension Delphi Collection Approach Issues To Do © 2002-4 USC-CSE 18 January 2019

COCOMO Security Extension Delphi Issues Different Stakeholders Needs Customer: “how much will system cost me?” Includes costs outside scope of developer e.g. Independent Testing & Certification Affects developer schedule Developer: “how much effort to build system?” Conclusion: Separate Delphi for Customer’s costs/effort other then developer’s Developer need to Effort to support Independent Testing & Certification Adjust schedule for time taken by Independent Testing & Certification © 2002-4 USC-CSE 18 January 2019

COCOMO Security Extension Delphi Issues Level of Detail to Collect Costing Secure Software, FAA-IT-ISS R&D Workshop 1/18/2019 COCOMO Security Extension Delphi Issues Level of Detail to Collect Current draft based on Common Criteria Functional Requirements 11 Classes 67 Families 138 Components 250 Elements Assurance Requirements 10 Classes 42 Families 93 Components  21 Classes x 7 levels ~4 questions each Is this 2 much to Ask? Couldn’t find better alternative Did Eliminated Question about schedule for some Separate Customer assurance work from Developer Created some examples NTK © 2002-4 USC-CSE 18 January 2019 © 2002-4 USC-CSE

COCOMO Security Extension Delphi Issues Example: Development Assurance Req. (ADV) Activity Nominal High Very High Extremely High Super High Ultra High Authentication No explicit authentication requirement Single authentication mechanism (FIA_UAU.4) Multiple authentication mechanism (FIA_UAU.5) Re-authenticating (FIA_UAU.6) Authentication failure handling (FIA_AFL.1) FIA_AFL.1 Protected authentication feedback (FIA_UAU.7) Simple trusted acknowledgement between TSF (FPT_SSP.1) Protected authentication feedback and unforgeable authentication (FIA_UAU.7, FIA_UAU.3) Mutual trusted acknowledgement between TSF (FPT_SSP.2) Trusted KSLOCS? 2-4 3-5 Application KSLOC Increase (%) 1% 1.1% 1.2% Effort to Produce Kernel (%) Additional Application Effort (%) Rational / Comments At higher levels, need to be more bug free, more effort for unit design, documentation & testing then predicted  need to have higher RELY & DOC © 2002-4 USC-CSE 18 January 2019

COCOMO Security Extension Delphi Issues Example: Development Assurance Req. (ADV) Activity Nominal High Very High Extremely High Super High Ultra High Requirements Specification Standard No explicit security requirements Informal functional & interface specification (ADV_FSP.1) Fully defined external interfaces (ADV_FSP.2) Informal security policy modeling (ADV_SPM.1) Semi-formal functional specifications (ADV_FSP.3) Semi-formal security policy modeling (ADV_SPM.2) Semi-formal functional specification (ADV_FSP.3) Formal security policy modeling (ADV_SPM.3) Formal functional specification (ADV_FSP.4) Trusted KSLOCS? Application KSLOC Increase (%) Effort to Produce Kernel (%) 10%      50 100 200 250 Additional Application Effort (%) Rational / Comments       © 2002-4 USC-CSE 18 January 2019

Highlights Project Schedule Early Estimation Model Work-Breakdown Structure (WBS) Common Criteria & Security Objectives COCOMO Security Extension Delphi Collection Approach Issues To Do © 2002-4 USC-CSE 18 January 2019

Issues 1 or 2 Drivers? Length of Delphi Different Stakeholders Needs Separate security assurance from functional requirements 1 driver for both Length of Delphi Different Stakeholders Needs Customer: “how much will system cost me” Developer: “how much effort for system” What data Do projects have? Can we get projects to collect © 2002-4 USC-CSE 18 January 2019

Highlights Project Schedule Early Estimation Model Work-Breakdown Structure (WBS) Common Criteria & Security Objectives COCOMO Security Extension Delphi Collection Approach Issues To Do © 2002-4 USC-CSE 18 January 2019

To Do Create website Behavior Analysis Refine models Revise Delphi Commercial Security community Refine models Revise Delphi Collect & analyze data Write Ph.D. Thesis (theses?) © 2002-4 USC-CSE 18 January 2019