Lecture 13: Security Control Issues Wayne Patterson SYCS 654 Spring 2010.

Slides:



Advertisements
Similar presentations
Configuration Management
Advertisements

Software Quality Assurance Plan
Configuration Management
CPIS 357 Software Quality & Testing I.Rehab Bahaaddin Ashary Faculty of Computing and Information Technology Information Systems Department Fall 2010.
Configuration Management Managing Change. Points to Ponder Which is more important?  stability  progress Why is change potentially dangerous?
Configuration management. Reasons for software configuration management  it facilitates the ability to communicate  status of documents, coding, changes.
CSC 395 – Software Engineering Lecture 25: SCM –or– Expecting Change From Everything But Vending Machines.
Configuration Management
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Ansale Cadeleña Edillor Miro Obando Ong Peralta Pepino Yuson.
Configuration Management
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 4 Slide 1 Slide 1 Configuration Management.
Chapter 27 Change Management
ISO 9000 Certification ISO 9001 and ISO
Software Configuration Management
CSSE 375 Software Construction and Evolution: Configuration Management
Configuration Management Avoiding Costly Confusion mostly stolen from Chapter 27 of Pressman.
Michael Solomon Tugboat Software Managing the Software Development Process.
Configuration Management for Transportation Management Systems Establishing and Maintaining System Integrity.
OHT 2.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 Software Quality assurance (SQA) SWE 333 Dr Khalid Alnafjan
1 Configuration Management 101 ITS Professional Capacity Building Program T3 Webinar February 21, 2008.
See:
Effective Methods for Software and Systems Integration
Software Configuration Management (SCM)
Configuration Management, Logistics, and Universal CM Issues Larry Bauer Boeing Commercial Airplanes NDIA Conference Miami March 4-5, 2005
Introduction to Software Quality Assurance (SQA)
Software Engineering Term Paper
Information Systems Security Computer System Life Cycle Security.
Configuration Management T3 Webinar Feb 21, 2008 Chuck Larsen ITS Program Coordinator Oregon Department of Transportation.
Software Configuration Management
Adaptive Processes © Adaptive ProcessesSimpler, Faster, Better Overview of ITIL Information Technology Infrastructure Library.
Software Quality Assurance Lecture 4. Lecture Outline ISO ISO 9000 Series of Standards ISO 9001: 2000 Overview ISO 9001: 2008 ISO 9003: 2004 Overview.
Software Configuration Management (SCM)
1 Configuration Management “The Cookbook Approach”
1 Chapter 9 Database Design. 2 2 In this chapter, you will learn: That successful database design must reflect the information system of which the database.
Configuration Management Matti Kuikka CONFIGURATION MANAGEMENT by Matti Kuikka, Unit Manager, Ericsson, Turku, Telecom R&D, Wireless Charging.
Configuration Management (managing change). Starter Questions... Which is more important?  stability  progress Why is change potentially dangerous?
SENG521 (Fall SENG 521 Software Reliability & Testing Software Product & process Improvement using ISO (Part 3d) Department.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
1.  Describe an overall framework for project integration management ◦ RelatIion to the other project management knowledge areas and the project life.
Software Quality Assurance
SOFTWARE CONFIGURATION MANAGEMENT. Change is inevitable when computer software is built. And change increases the level of confusion among software engineers.
Wayne Patterson SYCS 654 Spring An Emerging Issue  Governments, the private sector, and academic institutions are beginning to focus on the importance.
Software Project Management
Software Configuration Management (SCM). Product Developer Disciplines One view of the world is that there are three types of activities are required.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Software Configuration Management (SCM) Source: Pressman, R., Software Engineering: A Practitioner ’ s Approach. Boston: McGraw Hill, Inc., 2005; Ghezzi,
Maintaining and Sustaining System Integrity Configuration Management for Transportation Management Systems Configuration management (CM) describes a series.
State of Georgia Release Management Training
Software Quality Assurance. Software Quality Software quality is defined as the quality that ensures customer satisfaction by offering all the customer.
The NIST Special Publications for Security Management By: Waylon Coulter.
Configuration Control (Aliases: change control, change management )
Changing IT Managing Networks in a New Reality Alex Bakman Founder and CEO Ecora Software.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
TCSEC: The Orange Book.
Configuration Management
Configuration Management
Software Configuration Management
Software Configuration Management
Software Project Configuration Management
Chapter 11: Software Configuration Management
Software Configuration Management
Software Engineering (CSI 321)
Configuration Management
12207.
Lecture 3 Change Management
Software Configuration Management
Chapter 11: Software Configuration Management
HART Technologies Process Overview
Configuration Management
Presentation transcript:

Lecture 13: Security Control Issues Wayne Patterson SYCS 654 Spring 2010

CM Configuration management (CM) is a field of management that focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life. [1] For information assurance, CM can be defined as the management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life cycle of an information system. [2] CM for information assurance, sometimes referred to as Secure Configuration Management, relies upon performance, functional, and physical attributes of IT platforms and products and their environments to determine the appropriate security features and assurances that are used to measure a system configuration state. For example, configuration requirements may be different for a network firewall that functions as part of an organization's Internet boundary versus one that functions as an internal local network firewall.

SCM The traditional software configuration management (SCM) process is looked upon by practitioners as the best solution to handling changes in software projects. It identifies the functional and physical attributes of software at various points in time, and performs systematic control of changes to the identified attributes for the purpose of maintaining software integrity and traceability throughout the software development life cycle. The SCM process further defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. It identifies four procedures that must be defined for each software project to ensure that a sound SCM process is implemented. They are: Configuration identification Configuration control Configuration status accounting Configuration audits Computer hardware configuration goes beyond the recording of computer hardware for the purpose of asset management, although it can be used to maintain asset information. The extra value provided is the rich source of support information that it provides to all interested parties. This information is typically stored together in a configuration management database (CMDB). This concept was introduced by ITIL.

Configuration Management Configuration management is used to maintain an understanding of the status of complex assets with a view to maintaining the highest level of serviceability for the lowest cost. Specifically, it aims to ensure that operations are not disrupted due to the asset (or parts of the asset) overrunning limits of planned lifespan or below quality levels. In the military, this type of activity is often classed as "mission readiness", and seeks to define which assets are available and for which type of mission; a classic example is whether aircraft on-board an aircraft carrier are equipped with bombs for ground support or missiles for defense. A theory of configuration maintenance was worked out by Mark Burgess [4] [5] [6], with a practical implementation on present day computer systems in the software Cfengine able to perform real time repair as well as preventive maintenance.

Standards ANSI/EIA National Consensus Standard for Configuration Management EIA-649-A 2004 National Consensus Standard for Configuration Management ISO 10007:2003 Quality management systems - Guidelines for configuration management Federal Standard 1037C GEIA Standard Configuration Management Data Exchange and Interoperability IEEE Std IEEE Standard for Software Configuration Management Plans MIL-STD-973 Configuration Management (cancelled on September 20, 2000) STANAG 4159 NATO Material Configuration Management Policy and Procedures for Multinational Joint Projects STANAG 4427 Introduction of Allied Configuration Management Publications (ACMPs) CMMI CMMI for Development, Version 1.2 CONFIGURATION MANAGEMENT IEEE Std IEEE Guide to Software Configuration Management MIL-HDBK-61A CONFIGURATION MANAGEMENT GUIDANCE 7 February 2001 ISO Quality management - Guidelines for configuration management GEIA-HB Implementation Guide for Configuration Management ANSI/EIA National Consensus Standard for Configuration Management EIA-836 Consensus Standard for Configuration Management Data Exchange and Interoperability ANSI/EIA Processes for Engineering a System

Separation of Duties In order to develop a separation of duties, a mechanism such as the creation of compartments is necessary. Such a separation allows for the implementation of need to know policies.

Need to Know The term "need to know", when used by government and other organizations (particularly those related to the military or espionage), describes the restriction of data which is considered very sensitive.governmentmilitaryespionage Under need-to-know restrictions, even if one has all the necessary official approvals (such as a security clearance) to access certain information, one would not be given access to such information, or read into a clandestine operation, unless one has a specific need to know; that is, access to the information must be necessary for the conduct of one's official duties.security clearanceread intoclandestine operation As with most security mechanisms, the aim is to make it difficult for unauthorized access to occur, without inconveniencing legitimate access. Need-to-know also aims to discourage "browsing" of sensitive material by limiting access to the smallest possible number of people. The implementation of Mandatory Access Controls through a model such as the Bell- Lapadula rules are one way of enforcing need-to-know.