1
Security requirements Term – Secuirty requirement
A need or restriction from a user, a
stakeholder or the environment related to the goal to improve the system security.
Holistic security requirement engineering, Computers & Security 2004
Security requirements Term Secuirty requirement A need or - - PDF document
Security requirements Term Secuirty requirement A need or restriction from a user, a stakeholder or the environment related to the goal to improve the system security. Holistic security requirement engineering, Computers & Security
A need or restriction from a user, a
Holistic security requirement engineering, Computers & Security 2004
Business Process
internal oriented requirements
Risk Analysis
Requirements related to
Stakeholder and Environment
Stakeholder needs and demands
Phase 1
Find the
Phase 2
Compile the
Risk analysis – higher risk means earlier
Risks are no longer the only source
Business Metric systems – calculate a ROSI or
Frequently risk based A highly volatile area, which information security
Ask a stakeholder – ask people with
Problems with the dislike factor of security Reproducibility is problematic
Security benefit
(a) means high
(b) enables business
Cost/Complexity
Cost of realization and
Dog
Indifferent potential
Problem child
Low potential
Cash Cow
High potential
Star
Indifferent potential.
Cost/Complexity Security benefit
Delphi method is used for elicitation Questionnaire design is crucial to
achieve validity make the meaning of the distribution
Scale should be 6 because
Fowler says it should be between 5 and 7 It must be a multiple of two
Place the requirements in the matrix
Quadrants determine priority
Problem child -> low in the priority Cash Cow -> high in the priority list Star -> diagonal from the source; requirements
Dog -> similar to the stars
Requirement list = { Cash Cows, lower Stars,
Calculate a value for each requirement which defines
Compare requirement (ai;j) to requirement (ak;l) to
In two circumstances the prioritization value can be
Requirement values Informal { { 5,1} ,3,{ 6,2} ,4} Formal { 5,1,6,3,2,4}
DIN, VDE Norm 31000, The total process to identify, control,
National Information Systems Security Glossary National Information Systems Security Glossary
Bottom up
The risk is an aggregate of lower level risks
e.g. The risk that a phone break is a
Mainly used in technical risk analysis
Top down
The risk is detailed to derive more clarity Mainly use in organizational risk analysis
Baseline Approach
Do not analysis but apply baseline security
Informal Approach
Pragmatic risk analysis
Detailed Risk Analysis
In-depth valuation of assets, threat assessment
Combined Approach
Initial high level approach where important
ISO 13335 – Guidelines for the management of IT Security (GMITS)
Checklists/Best practices
RA Tools (e.g. CRAMM, COBRA …) Standards
ISO 17799, ISO 13335, Common criteria Basic Protection Manual (Grundschutzhandbuch)
...
Mathematical Approaches
Trend Analysis, Regression Analysis ...
Creative approaches
Brainstorming, Delphi Method ..
Assess the values for a risk (per asset)
How likely is it ? How harmful is it?
Assessment Approaches
Mathematical/Statistical Methods
Time line analysis (Trend Analysis) Regression analysis
Simulation
Monte Carlo Simulation
Expert guesses
Severity Analysis
Calculate the risk; r = p * e
Qualitative Methods
Abstract values for ranking (high – low
Quantitative Methods
Specific values indicating severity (p= 0.32,
Avoidance
A measurement is chosen (respectively not
Reduction
the cause of the risk is tried to be reduce.
reducing the vulnerability
reduce the effects
Detection
identified when the risk is emerging – eliminating the risk
source
Recovery
establish a recovery strategy
Transfer
transfer the risk to a third party
Acceptance
Preconditions set by the management
Residual Risk - The maximal acceptable risk
Final decision made by the management
Identify Context
Define the organizational
context
Identify Risks
What can happen and how
Analyze Risks
Determine Likelihood and
consequences
Evaluate Risk
Compare against criteria
and set priorities
Treat Risk
Identify treatment options
and decide for one
Identify Context Identify Risks Evaluate Risks Treat Risks Determine Likelihood Determine consequence Estimate level of risk Analyze Risks Accept Risks Monitor and Review Communicate and Consult
yes no
Security Policy (Site Security Handbook, B. Fraser)
Language
Formal languages
Natural language
Target
Product (mostly a
Overall (mostly an
Language
Natural Language Formal language
Bell- LaPadula Java Policy constrain language Corporate Policy Privacy policy for enterprises Internet privacy policy Liability policy - legal
Expresses policy at the highest level of
A statement about the importance of
Management and employee responsibility Critical and subsequent security requirements As a subdocument acceptable risks and
Policies need to set a high enough level to
Demonstrate organizational commitment to
Position of responsibility to owners, partners
Hierarchy of policies Concordant with organizational culture and
Tactical regulation instrument
Can have operational guidelines
Specific in a target area but not to detailed
Requirements to the product
Additional Security Relaxing other policies
Formulating special target policies for
Privacy Confidentiality statements Reliability statements ...