DAME Dependability and Security Study: Progress Report Howard Chivers University of York Practical Security for e-Science Projects 25 November 2003.

Slides:



Advertisements
Similar presentations
Rolls-Royce supported University Technology Centre in Control and Systems Engineering UK e-Science DAME Project Alex Shenfield
Advertisements

2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
Screen 1 of 43 Reporting Food Security Information Reporting Formats for Food Security Report Types Learning Objectives At the end of this lesson you will.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
<<Date>><<SDLC Phase>>
NEES Project Management Workshop June 16 June 18 1 Segment 2.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Jim Austin, University of York Grid-based on-line aeroengine diagnostics.
Rational Unified Process
SWE Introduction to Software Engineering
Grid Enabled Pattern Matching within the DAME e-Science Pilot Project Jim Austin Computer Science University of York.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
UGDIE PROJECT MEETING Bled September WP6 – Assessment and Evaluation Evaluation Planning  Draft Evaluation plan.
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO RISK IDENTIFICATION 2.
Risk Management.
The Software Product Life Cycle. Views of the Software Product Life Cycle  Management  Software engineering  Engineering design  Architectural design.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Purpose of the Standards
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Presentation on Integrating Management Systems
Enterprise Architecture
Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR ESM'2009, October 26-28, 2009, Holiday Inn Leicester, Leicester, United Kingdom.
Codex Guidelines for the Application of HACCP
More on Data Mining KDnuggets Datanami ACM SIGKDD
 A project is “a unique endeavor to produce a set of deliverables within clearly specified time, cost and quality constraints”
MethodGXP The Solution for the Confusion.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
S/W Project Management
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
DAME Dependability and Security Study Presenters Howard Chivers / Martyn Fletcher University of York.
ITEC224 Database Programming
An Introduction to Software Architecture
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
Instructore: Tasneem Darwish1 University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Requirement engineering.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 6 Slide 1 Requirements Engineering Processes l Processes used to discover, analyse and.
Requirements Engineering CSE-305 Requirements Engineering Process Tasks Lecture-5.
Software Requirements Engineering CSE 305 Lecture-2.
DAME: Distributed Engine Health Monitoring on the Grid
A GENERIC PROCESS FOR REQUIREMENTS ENGINEERING Chapter 2 1 These slides are prepared by Enas Naffar to be used in Software requirements course - Philadelphia.
DAME: The route to commercialisation Tom Jackson University of York.
© 2011 Underwriters Laboratories Inc. All rights reserved. This document may not be reproduced or distributed without authorization. ASSET Safety Management.
Chapter 13 Architectural Design
Lecture 7: Requirements Engineering
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
1 Introduction to Software Engineering Lecture 1.
The DAME project Professor Jim Austin University of York.
DAME: A Distributed Diagnostics Environment for Maintenance Duncan Russell University of Leeds.
DAME: A Distributed Diagnostics Environment for Maintenance Dr Tom Jackson University of York.
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
Overview of the DAME Project Distributed Aircraft Maintenance Environment University of York Martyn Fletcher.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
Requirement Engineering. Recap Elaboration Behavioral Modeling State Diagram Sequence Diagram Negotiation.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Access Control for Dynamic Virtual Organisations Duncan Russell, Peter Dew & Karim Djemame University of Leeds.
Ensuring the Safety of Future Developments
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
Outlines Overview Defining the Vision Through Business Requirements
ETICS An Environment for Distributed Software Development in Aerospace Applications SpaceTransfer09 Hannover Messe, April 2009.
Requirements Engineering Processes, York EngD Programme, 2009Slide 1 Requirements engineering processes Prof Ian Sommerville.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: Enterprise Content Management Suite ECM: A vendor marketing concept, not an.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
Security Engineering.
Software Requirements Specification Document
An Introduction to Software Architecture
Presentation transcript:

DAME Dependability and Security Study: Progress Report Howard Chivers University of York Practical Security for e-Science Projects 25 November 2003

This talk presents my personal perspective, not the considered view of the project or any of its partners. But credit and thanks must go to busy developers and industrial partners who have been consistently helpful and generous with their time, and to Martyn Fletcher who is the primary author for study deliverables.

Contents DAME Introduction DAME Introduction The Method: Dependability and Security The Method: Dependability and Security Stage One: System Context Stage One: System Context Stage Two: Asset Analysis Stage Two: Asset Analysis Summary Summary

DAME Engine flight data Airline office Maintenance Centre European data center London Airport New York Airport American data center Grid

Project Aims Develop a Grid-enabled diagnostic system Develop a Grid-enabled diagnostic system Demonstrate this on the Rolls-Royce AeroEngine diagnostics problem Demonstrate this on the Rolls-Royce AeroEngine diagnostics problem –A Diagnostic Grid –Grid management tools for unstructured data –An practical application demonstrator Develop the understanding needed for industrial deployment: Develop the understanding needed for industrial deployment: –Grid middleware and application/services layer integration –Scalability and Deployment options –Security and Dependability issues

Challenges Support on-line diagnostic workflow in real time Support on-line diagnostic workflow in real time Deal with the data from 1000’s engines in operation Deal with the data from 1000’s engines in operation Prove distributed pattern matching methodology Prove distributed pattern matching methodology Address customer concerns about grids, including scalability & security Address customer concerns about grids, including scalability & security Demonstrate the business case for the technology Demonstrate the business case for the technology

Why use a grid? Implementing a distributed, integrated, workflow has considerable potential customer value Implementing a distributed, integrated, workflow has considerable potential customer value The workflow requires collaboration between multiple stakeholders The workflow requires collaboration between multiple stakeholders An integrated business process is needed to provide evidence for any diagnosis, and traceability to subsequent action An integrated business process is needed to provide evidence for any diagnosis, and traceability to subsequent action The data is high volume, and is distributed between stakeholders’ sites (eg maintenance, factory, airports) The data is high volume, and is distributed between stakeholders’ sites (eg maintenance, factory, airports) The variable computing load makes resource sharing attractive for some processes The variable computing load makes resource sharing attractive for some processes

DAME – Project Partners Universities: Universities: –University of York –University of Sheffield –University of Oxford –University of Leeds Industrial: Industrial: –Rolls-Royce Aeroengines –Data Systems and Solutions –Cybula Infrastructure: - White Rose Grid - National e-Science Support Centre

Developers

Analysis Approach: Dependability & Security

Purpose of the Study Provide analysis to enable ultimate deployment of DAME in engine domain. Provide analysis to enable ultimate deployment of DAME in engine domain. Provide analysis as basis for deployment in other domains. Provide analysis as basis for deployment in other domains. Contribute to Grid community research in dependability and security. Contribute to Grid community research in dependability and security.

Dependability and Security Attributes: Attributes: –Reliability –Safety –Maintainability –Security (Confidentiality, Integrity, Availability) Attributes have varying significance in different systems. Attributes have varying significance in different systems.

Security (Risk) Analysis Focus on risk to the overall business process Focus on risk to the overall business process Process (see previous talk by Jonathan Moffett) Process (see previous talk by Jonathan Moffett) –Define system context: »Boundary / actors / assets / external assumptions. –Analyse assets: »Identify impact / threat for each. –Attackers perspective. –Vulnerabilities. »Identify likelihood. From matrix, identify unacceptable deployment risks, example: From matrix, identify unacceptable deployment risks, example: –High impact and high likelihood need to be reduced.

Security (Risk) Analysis

Dependability Analysis High level analysis for complex systems developed at York is rooted in the need for safety cases of layered systems. High level analysis for complex systems developed at York is rooted in the need for safety cases of layered systems.

High level Analysis of a Complex System Focuses on infrastructure. Focuses on infrastructure. Approach at York (based on FMEA – Failure Modes an Effects Analysis + SHARD - Software Hazard Analysis and Resolution in Design): Approach at York (based on FMEA – Failure Modes an Effects Analysis + SHARD - Software Hazard Analysis and Resolution in Design): –Define high level functions at specified interface. –Apply guidewords (omission, commission etc.) – undesirable situations. –Cause. –Effect. –Derived requirements - to prevent / mitigate. Satisfy derived requirements to provide dependability. Satisfy derived requirements to provide dependability.

Choice of method Approaches have complementary strengths Approaches have complementary strengths In combination: In combination: –Use security risk analysis to establish whole-system issues –Use ‘high level analysis’ to deal with non-security attributes, and provide infrastructure vulnerabilities into the main risk analysis –Combined study minimises project cost and customer involvement Take advantage of other sources of vulnerability information Take advantage of other sources of vulnerability information

Observations The security risk method provides a useful overall framework. The security risk method provides a useful overall framework... but in many projects a wider set of attributes will be needed... but in many projects a wider set of attributes will be needed. Using both forms of analysis explicitly deals with the flexible deployment of applications envisaged in the grid. Using both forms of analysis explicitly deals with the flexible deployment of applications envisaged in the grid... but it remains to be seen if the interface requirements between applications and infrastructure are mature enough to allow dependability analysis... but it remains to be seen if the interface requirements between applications and infrastructure are mature enough to allow dependability analysis.

Stage One: System Context

Context

System Context System Context document (DAME/York/TR/03.007) System Context document (DAME/York/TR/03.007) –Business process. –System boundary. –Actors (primary and supporting). –Assets (service and data). –Service interactions. –External assumptions. Purpose: Purpose: –Provides a concise reference – allows stakeholders to agree on a description of the system. –Identifies Assets: Services and Data ».. but not hardware?

Actors & System Context

Service Assets

Data Assets

Service & Data co-deployment CBRAnalyser SDMRecord CBRResult CBRRuleSet AURAResult Get Maintenance Data Produces Uses

Context: Method Business Use-Cases & initial Service diagram derived from design documents Business Use-Cases & initial Service diagram derived from design documents Aim for a Deployment-neutral description Aim for a Deployment-neutral description Checks: Checks: –Build & check data and service models from the interactions specified in the use-cases. –Is the data required by each service consistent with the data model? –Do members of the project, and its customers, think this represents their system?

Context: Method (2) Control granularity: Control granularity: –Services at deployment granularity. –Data, sufficient to distinguish between different use or origin. –Assets must be meaningful to customers to allow a discussion of threat & impact. Result: Result: –24 Data Types and 14 Services. –Contrast with »‘Initial brainstorm’ meeting: 4 data types & 4 services »Previous slide (9): 3 data types & 13 services (2 different!)

Observations Methodological analysis is necessary. Methodological analysis is necessary. Need to be flexible about representations & models to align with project methods. Need to be flexible about representations & models to align with project methods. Control: Control: –Granularity –Avoid mechanisms, keep to requirements The ‘grid’ nature may make it difficult to establish hardware assets - may be a problem or blessing, but needs to be recognised. The ‘grid’ nature may make it difficult to establish hardware assets - may be a problem or blessing, but needs to be recognised. The system is ‘virtual’ – need to be explicit about the management needed. The system is ‘virtual’ – need to be explicit about the management needed.

Stage Two: Asset Analysis

Asset Analysis Just Started. Just Started. Generated pro-forma of assets and generic concerns. Generated pro-forma of assets and generic concerns. Reviewed with Industrial Partners: Reviewed with Industrial Partners: –Reviewed system context document. –Preliminary assets analysis - assigned concerns and impacts to: »Data assets »Service assets Need to document and confirm results with project and industrial partners. Need to document and confirm results with project and industrial partners.

Process Keyword list to prompt discussion on each asset: Keyword list to prompt discussion on each asset: –execution, confidentiality, integrity, availability, privacy, completeness,provenance, non-repudiation… Only about half these categories used, and not all for every asset. Only about half these categories used, and not all for every asset. Impact rating: L/M/H in business terms: Impact rating: L/M/H in business terms: –L: significant cost –M: impact on company bottom line –H: long term impact on company bottom line

Typical Concerns Confidentiality of key industrial properties. Confidentiality of key industrial properties. –The most critical, at present, are algorithms Integrity of data used to make business decisions. Integrity of data used to make business decisions. Provenance of critical decisions made using the system. Provenance of critical decisions made using the system.

Observations New system requirements will probably emerge from this study: New system requirements will probably emerge from this study: –Finer grain control of users within roles –The need for provenance for data items as well as decisions (workflows) –The possible separation of different types of raw data to facilitate grid processing –The need to audit services in the (virtual) system Need to be careful about responsibilities when data or services are shared with other systems– e.g. long term data integrity for some data items is important, but outside DAME. Need to be careful about responsibilities when data or services are shared with other systems– e.g. long term data integrity for some data items is important, but outside DAME.

Observations The customers have real security concerns – this is not a system where all parts will be allowed to ‘run anywhere’. The customers have real security concerns – this is not a system where all parts will be allowed to ‘run anywhere’. –security analysis informs deployment options Keywords (e.g. integrity’) are very broad – need to record the actual concern in each case. Keywords (e.g. integrity’) are very broad – need to record the actual concern in each case. Linking impact (L/M/H) to business criteria helps prevent ‘drift’ of assessments. Linking impact (L/M/H) to business criteria helps prevent ‘drift’ of assessments.

Summary

Documents Produced Discussion / working documents: Discussion / working documents: –DAME Initial Dependability Assessment - AME/York/TR/ From meeting with industrial partners on 17 th March –Analysis of the Grid – Phillipa Conmy –Security Risk Brief – Howard Chivers –Options for Merging Dependability and Security Analysis - Howard Chivers. This includes a neutral terminology. –DAME Dependability and Security: Asset Analysis pro-forma. DAME Dependability and Security: System Context Document - DAME/York/TR/ DAME Dependability and Security: System Context Document - DAME/York/TR/

Future Work Complete System Context document and asset analysis. Complete System Context document and asset analysis. Assess vulnerabilities, including the use of high level analysis function and dependability key word analysis. Assess vulnerabilities, including the use of high level analysis function and dependability key word analysis. Produce likelihood - impact matrix. Produce likelihood - impact matrix. Target unacceptable risks. Target unacceptable risks. Identify deployment constraints & requirements Identify deployment constraints & requirements Identify mitigation mechanisms e.g., encryption, access controls, replication, etc. Identify mitigation mechanisms e.g., encryption, access controls, replication, etc.

Final Observations Security risk analysis is best carried out as an integrated part of the system design: Security risk analysis is best carried out as an integrated part of the system design: –The context can be part of the standard system documentation –Deployment and other design tradeoffs can be made early –The security analysis will highlight requirements that might otherwise be missed.

Final Observations (2) The grid nature of the problem introduces new challenges: DAME is a ‘virtual system’ The grid nature of the problem introduces new challenges: DAME is a ‘virtual system’ –Mapping to hardware is deferred –Requirements for administration of the ‘virtual’ system, as well as individual resources Appropriate security is essential before systems of this sort can be exploited commercially. Appropriate security is essential before systems of this sort can be exploited commercially.