S-vector for Web Application Security Assessment Review of Term Project Requirements and PDR Results CS996 ISM Spring 2005 Dr. William Hery.

Slides:



Advertisements
Similar presentations
Jump to first page NIST Risk Management Guide for Information Technology Systems Reference:
Advertisements

[Insert Project Name] Detailed Design Review (DDR) [Insert Date of DDR] Centers for Medicare & Medicaid Services eXpedited Life Cycle (XLC)
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Sensitive Metric Collection and Reporting System Michael Aiello Hanning Gao Martin Goldberg Michael Sosonkin Jason Woloz Presentation for Critical Review.
How to Prepare for the Fall Exam COM380/CIT304 Harry Erwin, PhD University of Sunderland.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 2 Software Processes.
Information System Security Engineering and Management Risk Analysis and System Security Engineering Homework (#2, #3) Dr. William Hery
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Term Project Teams of ~3 students Pick a system (discuss choice with me)  Want simple functionality, security issues, whole system (e. g., client and.
CS 501: Software Engineering
Information System Security Engineering and Management
Term Project Pick a system (discuss choice with me)  Want simple functionality, security issues, whole system (e. g., client and server side) Submit a.
Information System Security Engineering and Management
1 Introduction to System Engineering G. Nacouzi ME 155B.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Risk Management.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Roadmap Name Strategic Roadmap #n Interim Report April 15, 2005.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Enterprise Architecture
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
® IBM Software Group © 2006 IBM Corporation PRJ480 Mastering the Management of Iterative Development v2 Module 3: Phase Management - Inception.
Information Security Management
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
Chapter 2: Overview of Essentials ISE 443 / ETM 543 Fall 2013.
SEC835 Database and Web application security Information Security Architecture.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Security Risk Assessment Applied Risk Management July 2002.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
The Security Analysis Process University of Sunderland CSEM02 Harry R. Erwin, PhD.
NIST Special Publication Revision 1
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
CS CS 5150 Software Engineering Lecture 3 Software Processes 2.
Product Development Chapter 6. Definitions needed: Verification: The process of evaluating compliance to regulations, standards, or specifications.
Software Engineering Management Lecture 1 The Software Process.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
ISM 5316 Week 3 Learning Objectives You should be able to: u Define and list issues and steps in Project Integration u List and describe the components.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Alaa Mubaied Risk Management Alaa Mubaied
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Accounting and Information Systems: a powerful combination.
Software Development Process CS 360 Lecture 3. Software Process The software process is a structured set of activities required to develop a software.
Protecting your Managed Services Practice: Are you at Risk?
University of Southern California Center for Systems and Software Engineering RDCR ARB CS 577b Software Engineering II Supannika Koolmanojwong.
CMGT 400 Entire Course CMGT 400 Week 1 DQ 1  CMGT 400 Week 1 Individual Assignment Risky Situation  CMGT 400 Week 1 Team Assignment Kudler Fine Foods.
Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
On completion of the scenario, students will be able to: Learning Outcomes 1 Critically analyse and prioritise information security risks. 2 Systematically.
For more course tutorials visit
For More Best A+ Tutorials CMGT 400 Entire Courses (UOP Course) CMGT 400 Week 1 DQ 1 (UOP Course)  CMGT 400 Week 1 Individual Assignments.
Camera PDR/CD1 Planning 19 September 2008
Risk management.
Software Engineering Management
A Security Review Process for Existing Software Applications
Security Engineering.
Outcome TFCS-11// February Washington DC
Requirements – Scenarios and Use Cases
Information Security Risk Management
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

S-vector for Web Application Security Assessment Review of Term Project Requirements and PDR Results CS996 ISM Spring 2005 Dr. William Hery

Term Project Goals Primary Goal: to understand the integration of security into systems engineering  Its about the process: a systematic approach to developing and understanding security requirements and how those requirements lead to getting the right security into the system  Its not about using intuition to get the security design and then going back to find the requirements that lead you to that design (that’s the way politicians work :-) )  On small projects (like your term project) that might work, but on large scale projects it is a recipe for disaster  The logical sequence of getting to the security design is what you should understand from this. Secondary Goal: to bring see how to use some of the other security management processes in the project design

Term Project Pick a system (discuss choice with me)  Want simple functionality, security issues, whole system (e. g., client and server side) Submit a 1-2 page proposal to management (Dr. Hery) Assess risks, threats, vulnerabilities Develop a security policy Do a high level system security design Present a “preliminary design review” (PDR) to management (include risk analysis, policies, system architecture) Iterate on risk assessment, policy, design (what you should be up to now…) Present a final “critical design review” (CDR) to management and the class (optional, but strongly recommended to get my feedback)  DATE: Wed, April 5 (reading day), all afternoon Write a final report to management on above  Due 5 PM date of final. NO EXCEPTIONS

Example Project Pick a useful system, not an underlying technology Start with a “mission need statement” Describe the CONOPS Make explicit (and probably realistic) assumptions about infrastructure Major project steps:  Thorough risk analysis  Develop security policies  Perform the system security engineering. Use the risk analysis and policy to determine the security functions needed, and then to develop an architecture that has all the security functions and hardware, software components to enforce the security policies Major project deliverables:  Proposal  Preliminary design review (PDR)  Critical design review to class (CDR)  Final report on the design

PDR for the Term Project High level requirements  Functional Requirements (what the system should do)  Risk analysis to identify assets that need to be protected  Any legal requirements  Any corporate or organizational security policies not included above  High Level Security Policies System Architecture

PDR (Continued) Develop a high level security architecture based on the requirements  What security technologies and processes will be used (firewalls, crypto, IDS, etc.)  Where are they to be used Develop a “Security Compliance Matrix”  List all security requirements, and show what parts of the security technology and processes are used to meet the requirements Do a security requirements traceback  Show how each security technology or process is based on a requirement Present any security “trade studies”

Security System Engineering Process (PDR in blue) Mission Need CONOPS System Arch. Primary Sec Rqmts Legal Rqmnts Assets at Risk Corp/Org Policy Security Arch Threat Analysis Vulner. Analysis System Design Security Design Derived Sec Rqmts Other Rqmts Prelim. Risk Analysis Functional Rqmts Risk Analysis Assess

CDR and Final Report Outline (in order!) System Overview:  Mission Needs statement  System Functional Overview  System CONOPS Primary Requirements Analysis  Risk Analysis  Assets and values  Threats  Discuss asset/threat combinations  Applicable broad corporate/organizational policies  List of policy areas  At least one applicable policy written out in detail  Applicable legal issues  Requirements based on above Preliminary Architecture  Preliminary System Architecture  Preliminary Security Architecture  Justify what you do in terms of requirements

CDR and Final Report Outline (continued) Security Trade Studies (at least 2 for either the preliminary security architecture or the design)  List options for how to do something related to security  List factors that impact decision (e. g., costs, development time, support, security…this is not a complete list) Preliminary Assessment (simplified)  Requirements allocation matrix  Show what elements of the system is used to meet each requirement  Requirements traceback  For any security specific element (e. g., firewall, crypto…) or feature show what requirement forces you to provide that. System Design  Adds detail to architecture

CDR and Final Report Outline (continued) Update Risk Analysis  Identify vulnerabilities  Just show vulnerable areas, not lists of specific exploits  Update risk analysis to reflect the vulnerabilities  Revise assessment of asset/threat combinations  Identify risk approach for each (mitigate, accept, transfer--may be a combo for many) Update security requirements to reflect new risk assessment Security Design  Add detail to architecture based on updated requirements Update Simplified Security Assessment  Requirements Analysis  Compliance Matrix Other Security Management Issues  At most one slide/one page on each  Outline an appropriate business continuity plan  Discuss any TRANSEC/EMSEC issues and how to address them. Justify.  Discuss what kinds of physical security to provide. Justify.