Introduction to Assurance
Chapter 19
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-1
Introduction to Assurance Chapter 19 Computer Security: Art and - - PowerPoint PPT Presentation
Introduction to Assurance Chapter 19 Computer Security: Art and Science , 2 nd Edition Version 1.0 Slide 19-1 Overview Trust Problems from lack of assurance Types of assurance Life cycle and assurance Waterfall life cycle
Chapter 19
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-1
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-2
believe that the system will meet a set of requirements
requirements based on evidence provided by applying assurance techniques
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-3
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-4
Assurance Policy Mechanisms Statement of requirements that explicitly define the security expectations of the mechanism(s) Provides justification that the mechanism meets policy through assurance evidence and approvals based on evidence Executable entities that are designed and imple- mented to meet the requirements of the policy
under an evaluation by a credible body of experts who are certified to assign trust ratings or assurance levels to evaluated products and systems
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-5
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-6
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-7
secure system
states and a set of unauthorized states
more abstract than a policy
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-8
policy is complete, consistent, technically sound
requirements of security policy
consistent with security requirements of security policy
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-9
security policy requirements during installation, configuration, and day-to-day operation
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-10
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-11
Security requirements Design Implementation 1 3 4 2 Design and implementation
Assurance justification
product or system
situation
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-12
These are present in all models, but the emphasis and focus is different for each project, and will be more detailed than what is presented here
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-13
make this concept meet this meaning of security?
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-14
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-15
installed
improper security controls
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-16
important system patch, resulting in breach of financial information for hundreds of millions of people
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-17
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-18
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-19
Requirements definition and analysis System and software design Implementa- tion and unit testing Integration and system testing Operation and maintenance
really completed
and scoping of the project
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-20
Term “Agile software development” used to describe several Agile methodologies
(DSDM), Pragmatic Programming
In all, evidence of trustworthiness for assurance adduced after development
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-21
a sprint)
stakeholders
design, implement it
workable solution within each sprint
if not complete
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-22
lane
when another item arrives
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-23
enhance it
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-24
advance, and adequacy is goal
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-25
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-26
mathematical evidence
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 19-27