PROTECTION POKER - A GAME FOR RISK ESTIMATION Martin Gilje Jaatun - - PowerPoint PPT Presentation

protection poker a game for risk estimation
SMART_READER_LITE
LIVE PREVIEW

PROTECTION POKER - A GAME FOR RISK ESTIMATION Martin Gilje Jaatun - - PowerPoint PPT Presentation

PROTECTION POKER - A GAME FOR RISK ESTIMATION Martin Gilje Jaatun ( Yaw-toon) @seniorfrosk Based on the original game by Laurie Williams, NCSU Efficient and effective software security = risk based software security Impossible to


slide-1
SLIDE 1

PROTECTION POKER

  • A GAME FOR RISK

ESTIMATION

( Yaw-toon)

@seniorfrosk

Martin Gilje Jaatun

Based on the original game by Laurie Williams, NCSU

slide-2
SLIDE 2

@seniorfrosk @seniorfrosk

Efficient and effective software security = risk based software security

  • Impossible to prevent all security flaws and vulnerabilities
  • Limited resources – time, money, expertise
  • Most important to prevent, detect and remove flaws and

vulnerabilities with high risk:

  • Can easily be exploited by attackers
  • May impact important assets

2

slide-3
SLIDE 3

@seniorfrosk @seniorfrosk

What is Protection Poker?

  • Risk estimation in agile development teams
  • Originally by Laurie Williams, NCSU
  • Based on Planning Poker (effort estimation)
  • Performed in the beginning of every iteration, by the full

team

  • Goal: Rank the security risk of the features to be

implemented in the iteration

  • Ensure common understanding in the team on the need for

security in this iteration – and in general

3

slide-4
SLIDE 4

@seniorfrosk @seniorfrosk

  • Exposure:
  • Does it increase the attack surface?
  • What competence is needed to exploit this functionality?
  • What type of access to assets can be achieved (confidentiality, integrity, availability)?
  • Value of assets:
  • What data is "touched upon" by the functionality?
  • Value of the assets for the organisation/customers/users?
  • Value for an attacker?

risk = (the total value of all assets that could be exploited with a successful attack) × (the exposure)

4

Risk = value x exposure

Exposure

Hard to exploit Easy to exploit Asset High value High priority Low value Low priority

slide-5
SLIDE 5

@seniorfrosk

Interlude: Data Flow Diagrams

  • Useful to get overview
  • To understand the system's

attack surface

  • Trust boundaries
  • How data flows in the system

5

Task/process Entity/user Data flows Data store Boundary Complex/decomposable

slide-6
SLIDE 6

@seniorfrosk @seniorfrosk

6

Web Servlet

Users

Login Process

Web pages Database files

College Library Database

Data Data

Authenticate User SQL Query Authenticate User SQL Query Result Authenticate User Authenticate User Result Pages Web Server / Database Boundary User / Web Server Boundary Login Request Login Response

High-level description – A college library site

Case and data flow diagram inspired by https://www.owasp.org/index.php/Application_Threat_Modeling

slide-7
SLIDE 7

@seniorfrosk @seniorfrosk

  • The students can make a request for a new book
  • Assets (just a few examples!)
  • Authentication credentials (login details)
  • Personal data
  • Webpages
  • Login session
  • Audit data
  • SQL queries
  • NB: If you have many small

features, consider grouping them (e.g. as use cases)

7

Example of new feature

slide-8
SLIDE 8

@seniorfrosk @seniorfrosk

We play (at least) two rounds

  • Value
  • For every asset the

feature/requirement "touches"

  • Exposure

NB: Consensus!

8

slide-9
SLIDE 9

@seniorfrosk @seniorfrosk

First: Value of asset "Authentication credentials"

9

slide-10
SLIDE 10

@seniorfrosk

Let the game begin!

10

Asset: Credentials

slide-11
SLIDE 11

@seniorfrosk

Show your hand!

11

Authentication credentials are pretty much the most important thing we have? A password gone walkabout is hardly a crisis, there are

  • ther mechanisms

that can prevent misuse Asset: Credentials

slide-12
SLIDE 12

@seniorfrosk

Play again! (same asset)

12

Asset: Credentials

slide-13
SLIDE 13

@seniorfrosk

Show your hand!

13

Asset: Credentials

slide-14
SLIDE 14

@seniorfrosk

14

(We skip the rest of the assets…)

Now: Exposure of feature "Order book"

slide-15
SLIDE 15

@seniorfrosk

Then play on!

15

Exposure "Order book"

slide-16
SLIDE 16

@seniorfrosk

Show cards!

16

It's a functionality available from the internet, even though access is restricted All you can do is request a book, what could possibly go wrong? Exposure "Order book"

slide-17
SLIDE 17

@seniorfrosk

New vote!

17

Exposure "Order book"

slide-18
SLIDE 18

@seniorfrosk

Show cards!

18

Exposure "Order book"

slide-19
SLIDE 19

@seniorfrosk

Sum assets feature #1

19

# Asset Value 1 Authentication credentials 80 2 Personal data 100 3 Webpages 50 4 Login session 80 5 Audit data 90 6 SQL queries 10 SUM 410

slide-20
SLIDE 20

@seniorfrosk

Result

20

# Requirement/feature Exposure ∑ value assets Risk Rank 1 Order book 50 410 20500 1 2 … 3 … 4 Coffe break warning 10 10 100 5 5 Add Admin user 100 150 15000 2

slide-21
SLIDE 21

@seniorfrosk @seniorfrosk

Calibration

  • Note: The risk of a requirement is compared to that of
  • ther requirements in the same project
  • It's all relative!
  • The first time one plays Protection Poker, it is

recommended to do a calibration to set the end-points

  • f the scale used.
  • Which assets have highest/lowest value?
  • Which features increase exposure the most/least?

21

slide-22
SLIDE 22

@seniorfrosk

Calibration – University Library

22

  • Exposure
  • Asset value

Low Medium High

Coffee break alert Add admin user Personal Data General library info

slide-23
SLIDE 23

@seniorfrosk @seniorfrosk

A practical tip on playing

  • Keep your friends close,

and your cards closer!

  • Don't throw your cards in the

ring…

  • In the discussion phase, you

need to remember who bid what

  • … and you need your OWN

card back for the next round!

23

slide-24
SLIDE 24

@seniorfrosk @seniorfrosk

Good luck!

24

http://www.sintef.no/protection-poker http://www.sintef.no/sos-agile

slide-25
SLIDE 25

Technology for a better society