jürgen großmann combining security risk (fhg fokus) fredrik … · 2015-06-24 · security...

16
Combining Security Risk Assessment and Security Testing based on Standards Jürgen Großmann (FhG Fokus) Fredrik Seehusen (SINTEF ICT) 3 rd RISK Workshop at OMG TC in Berlin, 2015-06-16 3 rd RISK Workshop 2015 1

Upload: others

Post on 23-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

Combining Security Risk Assessment and Security Testing

based on Standards

Jürgen Großmann

(FhG Fokus) Fredrik Seehusen

(SINTEF ICT)

3rd RISK Workshop at OMG TC in Berlin, 2015-06-16

3rd RISK Workshop 2015 1

Page 2: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

FP7 project RASEN (RASEN - 316853)

3rd RISK Workshop 2015 2

Developing methods and tools to support security assessments for large-scale networked infrastructures by considering: 1.technical aspects 2.legal and regulatory aspects 3.uncertainty and risk

Page 3: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

The RASEN method for security testing, risk & compliance assessment

� Conforms to ISO/IEC 31000 � Integrates risk assess-

ment, compliance assessment and security testing in a meaningful manner

� Addresses management aspects as well as assessment aspects

3rd RISK Workshop 2015 3

facts facts

expert

judgment

expert

judgment

Page 4: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

Serves with different instantiations for different tasks

3rd RISK Workshop 2015 4

Test-based risk

assessment

Risk-based

security testing

Risk-based

compliance assessment

Page 5: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

Two main workstreams: Risk assessment and security testing

3rd RISK Workshop 2015 5

A test-based security risk assessment

process (1)

•starts with the risk assessment

• is used to optimize security risk

assessment with empirical data coming

from test results or compliance issues.

A test-based security risk assessment

process (1)

•starts with the risk assessment

• is used to optimize security risk

assessment with empirical data coming

from test results or compliance issues.

A risk-based method for compliance and

security testing (2)

•starts with the identification of issues by

security testing or compliance assessment

•focus the compliance and security testing

resources on the areas that are most likely

to cause concern

•building and prioritizing the compliance

measures or testing program around

these risks.

A risk-based method for compliance and

security testing (2)

•starts with the identification of issues by

security testing or compliance assessment

•focus the compliance and security testing

resources on the areas that are most likely

to cause concern

•building and prioritizing the compliance

measures or testing program around

these risks.

Page 6: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

Workstream 1: Test-based security risk assessment

1. Test-based risk identification

2. Test-based risk estimation

� Basic idea:

improve risk assessment activities through facts from testing

3rd RISK Workshop 2015 6

Communicate & Consult

Monitoring & Review

Page 7: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

Test-based risk identification

a) Test-based threat and threat scenario identification

b) Test-based vulnerability identification

3rd RISK Workshop 2015 7

Page 8: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

Test-based risk estimation

a) Test-based likelihood estimation b) Test-based estimate validation

3rd RISK Workshop 2015 8

Page 9: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

Workstream 2: Risk-based security testing compliant to ISO 29119

1. Risk-based security test planning

2. Risk-based security test design & implementation

3. Risk-based test execution, analysis & summary

� Basic idea: focus testing activities on high risk areas

3rd RISK Workshop 2015 9

Page 10: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

Identify Feature Sets & Potential Vulnerabilities

Derive Test Conditions

Derive Test Coverage Items

Derive Test Cases

Assemble Test Sets

Derive Test Procedures

Security Risk

Assessment Artefacts

Test Procedure

Specification

a

b

c

d

Threat and

Vulnerability

Assessment

Risk Evaluation

Results

Test Case

Specif ication

Test Design

Specification

Risk-based security test design and implementation

3rd RISK Workshop 2015 10

a) Risk-based identification

and prioritization of

features sets

b) Risk-based derivation of

test conditions and test

coverage items

c) Threat scenario based

derivation of test cases

d) Risk-based assembly of test

procedures

Page 11: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

Activities are specified in detail to provide guidance

3rd RISK Workshop 2015 11

Page 12: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

Supported by the RASEN toolbox and the RASEN exchange format

RASEN - 316853 12

Page 13: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

Mapping to System Lifecycle Phases

RASEN - 316853 13

Design &

Implementation

Verification &

Validation

Operation &

Maintenance

Provision of risk assessment results

Refinement

Update

Provision of risk assessment results

Provision of test results

Provision of test results

Component

Security Test

System Security

Test

System Security Regression Test

Penetration Test

Component Security Regression

Test

System Security

Risk Analysis

Component

Security Risk

Analysis

System

perspective

Component

perspectivePe

rsp

ect

ive

s

Continuous Risk Management

Page 14: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

The RASEN method is itself in standardization

3rd RISK Workshop 2015

Case Studies: To assemble case study

experiences related to security testing.

Industrial experiences may cover but

are not restricted to the following

domains: Smart Cards, Industrial

Automation, Radio Protocols,

Transport/Automotive,

Telecommunication

Case Studies: To assemble case study

experiences related to security testing.

Industrial experiences may cover but

are not restricted to the following

domains: Smart Cards, Industrial

Automation, Radio Protocols,

Transport/Automotive,

Telecommunication

Security Assurance Life Cycle:

Guidance to the application

system designers in such a

way to maximise both

security assurance and the

verification and validation of

the capabilities offered by the

system's security measures.

Security Assurance Life Cycle:

Guidance to the application

system designers in such a

way to maximise both

security assurance and the

verification and validation of

the capabilities offered by the

system's security measures.

Terminology: To collect the basic

terminology and ontology (relationship

between stake holder and application)

to be used for security testing in order

to have a common understanding in

MTS and related committees.

Terminology: To collect the basic

terminology and ontology (relationship

between stake holder and application)

to be used for security testing in order

to have a common understanding in

MTS and related committees.

Risk assessment and risk-

based security testing

methodologies: Describes a

set of methodologies that

combine risk assessment and

testing. The methododologies

are based on standards like

ISO 31000 and IEEE 29119

Risk assessment and risk-

based security testing

methodologies: Describes a

set of methodologies that

combine risk assessment and

testing. The methododologies

are based on standards like

ISO 31000 and IEEE 29119

Published

Stable Draft

Stable Draft

Published

Page 15: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

RASEN method summary

� Covers the integration of security testing, risk & compliance assessment

� Is concisely specified and supported by tools � Is mature and powerful

� applied to all RASEN case studies � integrates with recent risk assessment and testing

standards � constitutes standardization work item at ETSI

3rd RISK Workshop 2015 15

Page 16: Jürgen Großmann Combining Security Risk (FhG Fokus) Fredrik … · 2015-06-24 · security testing (2) •starts with the identification of issues by security testing or compliance

RASEN - 316853 16