security patterns
play

Security Patterns M. Schumacher, E. Fernandez-Buglioni, D. - PowerPoint PPT Presentation

Security Patterns M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Bushmann, and P. Sommerlad, Security Patterns: Integrating Security and Systems Engineering, John Wiley and Sons Ltd., 2006 Lecture outline What is pattern? What is


  1. Security Patterns M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Bushmann, and P. Sommerlad, Security Patterns: Integrating Security and Systems Engineering, John Wiley and Sons Ltd., 2006

  2. Lecture outline • What is pattern? • What is security pattern? • Security pattern landscape • SREBP • Examples of security risk-oriented patterns • Pattern identification and security requirements elicitation • Case study 410 ¡

  3. Lecture outline • What is pattern? • What is security pattern? • Security pattern landscape • SREBP • Examples of security risk-oriented patterns • Pattern identification and security requirements elicitation • Case study 411 ¡

  4. What is a Pattern? A solution to a problem that arises within specific context Context – Problem – Solution 412 ¡

  5. How does pattern distinguish from an ordinary solution? • Pattern describes: – Configuration of elements • Design outline • Code – Set of instruction to create the configuration of elements • Process – Presents high-quality proven solution – Reusability – Well expressed - initiates a dialog 413 ¡

  6. No Pattern is an Island • A pattern provides a self-contained solution for a specific problem but they are not independent of one another • Refinement – Solution proposed by a particular pattern can often be implemented with help of other patterns • which resolve the problem of the original problem – Each pattern depends on the smaller patterns it contains and on the larger patterns in which it is contained 414 ¡

  7. Patterns are Everywhere • Mid 1990s - Object Oriented Design patterns – Most widely known patterns Gang-of-Four book in 1995 • Software architecture • Programming levels • Fundamental structure and workflow of application domain – Health Care, Corporate Finance • Patterns spread in many other specific areas: – Concurrent networked systems and programming – Server Components – Human-computer Interaction – .... Many other specific areas Security – interesting area 415 ¡

  8. Lecture outline • What is pattern? • What is security pattern? • Security pattern landscape • SREBP • Examples of security risk-oriented patterns • Pattern identification and security requirements elicitation • Case study 416 ¡

  9. Security ¡Pa3erns ¡ 417 ¡

  10. Security Patterns • A security pattern describes – a particular recurring security problem – that arises in a specific security context – presents a well-proven generic scheme for a security solution • Codify security knowledge in structured and understandable way • Presentation is familiar to the audience • Proven solutions improve the integration of security into enterprises where needed 418 ¡

  11. Lecture outline • What is pattern? • What is security pattern? • Security pattern landscape • SREBP • Examples of security risk-oriented patterns • Pattern identification and security requirements elicitation • Case study 419 ¡

  12. Security Pattern Landscape 1. Enterprise Security and Risk Management 2. Identification and Authentication 3. Access Control Model 4. System Access Control Architecture 5. Operating System Access Control 6. Accounting 7. Firewall Architecture 8. Secure Internet Applications 9. Cryptographic Key Management patterns 420 ¡

  13. Security Pattern Landscape 421 ¡

  14. 1. Enterprise Security and Risk Management • Content : The enterprise has some function or mission and wants to address security issues as they relate to that mission 422 ¡

  15. 2. Identification and Authentication • Content : Specific requirements and design for the identification and authentication services 423 ¡

  16. 3. Access Control Model • Content : High level models represent the security policies of the requirements. These models define security constraints at the architectural level, the application level, and are enforced by the lower levels. 424 ¡

  17. 4. System Access Control Architecture • Essential for systems that permit or deny their use explicitly. Patterns deal with the architecture of the software systems. 425 ¡

  18. 5. Operating System Access Control • Access control in operating systems – Authenticator – Controlled process creator – Controlled object factory – Controlled object monitor – Controlled virtual address space – Execution domain – Controlled execution environment – File authorization 426 ¡

  19. 6. Accounting • Security audit and accounting – Risk events are violations that occur during operational activities. Decision makers need to be aware of the events that occur involving the assets 427 ¡

  20. 7. Firewall Architecture • Represent trade-offs between complexity, speed, and security, and which are tailored to control attacks on specific layers of the network Keep ¡state ¡ Address ¡filtering ¡ Proxy-based firewall Proxy ¡filtering ¡ Address ¡filtering ¡ Packet filter firewall Statefull firewall Keep ¡state ¡ Firewall ¡pa3ern ¡relaDonship ¡ 428 ¡

  21. 8. Secure Internet Applications 429 ¡

  22. 9. Cryptographic Key Management • Fundamental role in secure communication – Secure communication – Cryptographic key generation – Session key exchange with public keys – Public key exchange – Public key database – Session key exchange with server-side certificate – Session key exchange with certificates – Certificate authority – Cryptographic smart card – Certificate revocation 430 ¡

  23. Patterns on Threats to the System Uzunov A. V. , E. B. Fernandez , An Extensible Pattern-based Library and Taxonomy of Security Threats for Distributed Systems , Computer Standards & Interfaces, 2014 First level threats Second level threats • Identify attacks • Cryptography attacks • Network communication attacks • Countermeasure design • Network protocol attacks • Configuration/ administration • Passing illegal data attacks • Network protocol threats • Stored data attacks • Remote information inference • Loss of accountability • Uncontrolled operations 431 ¡

  24. Lecture outline • What is pattern? • What is security pattern? • Security pattern landscape • SREBP • Examples of security risk-oriented patterns • Pattern identification and security requirements elicitation • Case study 432 ¡

  25. SREBP : Security Requirements Elicitation from Business Proceses 433

  26. Understanding ¡work ¡pracDces ¡and ¡their ¡changes ¡ Processing ¡of ¡Informa/on ¡ Everything that IT does, reduces to six functions • Capturing ¡informa/on ¡ • Retrieving ¡informa/on ¡ ¡ – Keyboard, ¡bar ¡code ¡reader, ¡ – From ¡any ¡storage ¡device ¡ digital ¡camera ¡ • Manipula/ng ¡informa/on ¡ • Transmi5ng ¡informa/on ¡ – CalculaDons, ¡combinaDons ¡of ¡ – Wired-­‑, ¡wireless-­‑phone ¡ data ¡ • Storing ¡informa/on ¡ • Displaying ¡informa/on ¡ – Hard ¡disk, ¡memory ¡card, ¡ – Monitor, ¡printer ¡ internet ¡ ¡434 ¡ ¡

  27. Football Federation Case ¡435 ¡ ¡ 435 ¡

  28. Football Federation Case ¡436 ¡ ¡ 436 ¡

  29. Lecture outline • What is pattern? • What is security pattern? • Security pattern landscape • SREBP • Examples of security risk-oriented patterns • Pattern identification and security requirements elicitation • Case study 437 ¡

  30. Security Risk-oriented Patterns SRP1 : Secure data from unauthorized access SRP2 : Secure data transmitted between business entities SRP3 : Secure business activity after data is submitted SRP4 : Secure business services against denial of service attacks SRP5 : Secure data stored in / retrieved from the data store [Ahmed and Matulevi č ius, 2014] ¡438 ¡ ¡ 438

  31. Pattern structure 439 ¡

  32. SRP2 : Securing data that flow between the business entities 440 ¡

  33. Security Risk-oriented Patterns SRP1 : Secure data from unauthorized access SRP2 : Secure data transmitted between business entities SRP3 : Secure business activity after data is submitted SRP4 : Secure business services against denial of service attacks SRP5 : Secure data stored in / retrieved from the data store [Ahmed and Matulevi č ius, 2014] ¡441 ¡ ¡ 441

  34. Security Risk-oriented Patterns SRP1 : Secure data from unauthorized access SRP2 : Secure data transmitted between business entities SRP3 : Secure business activity after data is submitted SRP4 : Secure business services against denial of service attacks SRP5 : Secure data stored in / retrieved from the data store [Ahmed and Matulevi č ius, 2014] ¡442 ¡ ¡ 442

  35. Security Risk-oriented Patterns SRP1 : Secure data from unauthorized access SRP2 : Secure data transmitted between business entities SRP3 : Secure business activity after data is submitted SRP4 : Secure business services against denial of service attacks SRP5 : Secure data stored in / retrieved from the data store [Ahmed and Matulevi č ius, 2014] ¡443 ¡ ¡ 443

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend