from requirement to standard security test · 2019-04-12 · public from requirement to standard...

32
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 7,6 cm) From Requirement to Standard Security Test A brief introduction to the world of security testing Christian Folda (Test Architect) www.continental-corporation.com Interior Body and Security

Upload: others

Post on 21-Mar-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Bitte decken Sie die schraffierte Fläche mit einem Bild ab.

Please cover the shaded area with a picture.

(24,4 x 7,6 cm)

From Requirement to Standard Security Test

A brief introduction to the world of security testing

Christian Folda (Test Architect)

www.continental-corporation.com Interior – Body and Security

Page 2: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test 03-Apr-2019

2C. Folda © Continental AG

Agenda

Cyber Security Introduction2

Security Testing Introduction3

Example4

Introduction1

Page 3: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Continental Corporation Overview 2017

› Since 1871 with headquarters in Hanover, Germany

› Sales of €44 billion

› 235,473 employees worldwide

› 554 locations in 61 countries

Sales by division in %

Status: December 31, 2017

Chassis & Safety22%

Powertrain17%

Interior21%

Tires26%

ContiTech14%

03-Apr-2019

C. Folda © Continental AG 3

Page 4: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Continental Corporation Five Strong Divisions

Chassis & Safety

Vehicle Dynamics

Hydraulic Brake Systems

Passive Safety & Sensorics

Advanced Driver Assistance

Systems (ADAS)

Tires

PLT,Original Equipment

PLT, Replacement Business,EMEA

PLT, Replacement Business,The Americas

PLT, Replacement Business,APAC

Commercial Vehicle Tires

Two Wheel Tires

PLT – Passenger and Light Truck Tires

Interior

Instrumentation & Driver HMI

Infotainment & Connectivity

Body & Security

Commercial Vehicles &

Aftermarket

ContiTech

Air Spring Systems

Benecke-Hornschuch

Surface Group

Conveyor Belt Group

Industrial Fluid Solutions

Mobile Fluid Systems

Power Transmission Group

Vibration Control

Powertrain

Engine & Drivetrain Systems

Hybrid Electric Vehicle

Powertrain Components

Contract Manufacturing

03-Apr-2019

C. Folda © Continental AG 4

Page 5: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Interior DivisionOur Business Units & Product Portfolio

› Instrument clusters

› Full digital clusters

› Integrated Interior Platform

› Display solutions

› Head-up displays

› Haptic controls

› Interior camera

› Radios

› Infotainment

› Connectivity & telematics

› Software &

connected solutions

Commercial Vehicles & AftermarketInfotainment & ConnectivityInstrumentation & Driver HMI

› Body control modules

› Access control systems

› Power closures

› Door control units

› Intelligent Glass Control

› Seat comfort systems

› Tire information systems

› Gateways

› Power stabilization

› Lighting control units

› Advanced antenna electronics

› Smart device Integration

Body & Security

› Tachographs and telematics

› Visual and haptical human-machine

interface

› Chassis, body and transmission

electronics

› Spare parts, wear parts and tools

› Original equipment services

› Services and diagnostics for the

independent aftermarket, fleets and

vehicle manufacturers

› Key as a Service

› In-Car Data as a Service

› eHorizon as a Service

› City-Data as a Service

03-Apr-2019

C. Folda © Continental AG 5

Page 6: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Business Unit Body & SecurityProduct Portfolio

03-Apr-2019

C. Folda © Continental AG 6

Page 7: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test 03-Apr-2019

7C. Folda © Continental AG

Agenda

Introduction1

Security Testing Introduction3

Example4

Cyber Security Introduction2

Page 8: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Cyber Security IntroductionDefinition Cyber Security

Cybersecurity, computer security or IT security is the protection

of computer systems from the theft and damage to

their hardware, software or information, as well as

from disruption or misdirection of the services they provide.

Cybersecurity includes controlling physical access to the hardware, as well as

protecting against harm that may come via network access, data and code

injection. Also, due to malpractice by operators, whether intentional or

accidental, IT security is susceptible to being tricked into deviating from

secure procedures through various methods.

03-Apr-2019

C. Folda © Continental AG 8

Page 9: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

New threats, new needs…

Mobility ServicesOut-of-Vehicle

Prevent

Understand

Respond

Inside Vehicle

Holistic Security Concept

Car theft

03-Apr-2019

C. Folda © Continental AG 9

Compromise safety

Minor crimes

Invasion of privacy

Car theft

Page 10: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Cyber Security IntroductionAttack Vectors

Long-Range Wireless Access

Physical Access

Indirect Physical Access

Short-Range Wireless Access

Remote Attack Interfaces

In-Vehicle Attack

Interfaces

Distance

03-Apr-2019

C. Folda © Continental AG 10

Page 11: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Cyber Security IntroductionThreats & Security Measures on ECU

Manipulate keys

Disable software functions

Unauthorized diagnosis

access

Unauthorized software update

Disturb communicatio

n

Eavesdrop message

Inject wrong key

Manipulate software

Extract secret keys

Steal software

Manipulate messages

03-Apr-2019

C. Folda © Continental AG 11

Page 12: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Cyber Security IntroductionThreats & Security Measures on ECU

Manipulate keys

Disable software functions

Unauthorized diagnosis

access

Unauthorized software update

Disturb communicatio

n

Eavesdrop message

Inject wrong key

Manipulate software

Extract secret keys

Steal software

Manipulate messages

› Unauthorized

software update

› Inject wrong key

› Unauthorized diagnosis access

› Disturb communication

› Disable software functions

› Manipulate Software

› Manipulate messages

› Manipulate keys

› Steal Software

› Eavesdrop message

› Extract secret keys

Confidentiality Integrity

AvailabilityAuthenticity

03-Apr-2019

C. Folda © Continental AG 12

Page 13: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test 03-Apr-2019

13C. Folda © Continental AG

Agenda

Introduction1

Cyber Security Introduction2

Example4

Security Testing Introduction3

Page 14: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Security Testing IntroductionWhy Security Testing

Specified

Function of

an ECU

Intended Behavior

03-Apr-2019

C. Folda © Continental AG 14

Page 15: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Security Testing IntroductionWhy Security Testing

Specified

Function of

an ECU

Intended Behavior

Specified

Function of

an ECU

Implemented

Function

of an ECU

Missing or Incorrect

Functionality

Intended Behavior

Implemented

Function

of an ECU

03-Apr-2019

C. Folda © Continental AG 15

Page 16: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Security Testing IntroductionWhy Security Testing

Specified

Function of

an ECU

Implemented

Function

of an ECU

Missing or Incorrect

FunctionalitySide-Effect Behavior

Intended Behavior

Implemented

Function

of an ECU

03-Apr-2019

C. Folda © Continental AG 16

Page 17: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Security Testing IntroductionGoals of Security Testing

› Define the Level of Security for the Project

› What are the attacker Profiles

› What are the Security assets

› …

› There is no 100% Security!

› Fleet Attacks should be prevented

› The Goals of Security Testing:

› ensure that chosen Level of Security is reached

› Test for known Attacks on used technologies

› Detect unwanted side behavior or Vulnerabilities SRC: Screen from Zimperium presentation video “Xiaomi Scooter Hack”

https://youtu.be/ASygXa8UVYk

03-Apr-2019

C. Folda © Continental AG 17

Page 18: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Classic Project Requirements

• Sources: Stakeholder requirements, TARA results, security measures

• Ex: „The product must be secure against „CAN ID 0 DoS“

Research

• Sources: conferences, articles, security research

• General research results from public or private research facilities on general or specialist topics

• Includes also “well known” attacks

• Ex: HSM Chip Security, Heartbleed, Spectre …

Incidents

• Sources: Incidents in the Automotive - or IT Market, Penetration Test Reports, CVE’s

• Successful attacks in the Automotive and IT Market, Company related incident report

• Ex: Internal Pentest reports, Used chip get’s cracked, Used cryptography get’s cracked

Security RequirementsOrigin of Requirement

03-Apr-2019

C. Folda © Continental AG 18

Page 19: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Security RequirementsForging a Requirements Set

Set of Requirements

› Goal: All the requirement sources described must be

translated into a consistent set of requirements.

1. Select all matching Requirements (filter)

2. Remove Duplicates

3. Apply the Requirements

03-Apr-2019

C. Folda © Continental AG 19

Page 20: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Security TestingDefinition of Test Types

› The classic Penetration Test

› Performed by an company external or Project independent Team

› Highly skilled Tester

› Creative Testing with ‚loose‘ definition of Scope

› Mostly done at the end of the Development or after big releases

› Validates the Test Process and Verifies the product Security

Penetration Test

› An ‚in between‘ of classic Testing and Penetration Testing

› Performed during Development in the normal Test process

› Very clear defined Test Cases/Test Scripts for testing

› Can be executed by „normal“ Test Engineers

› Checking for generally known Vulnerabilities, Implementation errors

› Verifies the Product Security

Standard Security

Test

03-Apr-2019

C. Folda © Continental AG 20

Page 21: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Security TestingWhy Standard Security Test

Consistent

Quality

Executed in

The Project

Reduce

Scope in

Pentest

Fail

Faster

Automated

Testcases

03-Apr-2019

C. Folda © Continental AG 21

Page 22: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Development TestRelease Version 1

Development TestRelease Version 2

Development Test …

Security TestingSecurity Testing Process

Development TestRelease Version 1

Development TestRelease Version 2

…Penetration

Test

Development Test Security TestRelease

Version 1Development Test Security Test

Release Version 2

…Penetration

Test

Development Process without Security Testing

Development Process with Penetration Testing

Development Process with Standard Security and Penetration Testing

03-Apr-2019

C. Folda © Continental AG 22

Page 23: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Security TestingConclusion

Specified

Function of

an ECU

Implemented

Function

of an ECU

Missing or Incorrect

FunctionalitySide-Effect Behavior

Intended Behavior

Implemented

Function

of an ECU

03-Apr-2019

C. Folda © Continental AG 23

Page 24: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Security TestingConclusion

Specified

Function of

an ECU

Implemented

Function

of an ECU

Missing or Incorrect

FunctionalitySide-Effect Behavior

Intended Behavior

Standard

(Positive) Testing

Standard Security

(Positive) Testing

Implemented

Function

of an ECU

03-Apr-2019

C. Folda © Continental AG 24

Page 25: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Security TestingConclusion

Specified

Function of

an ECU

Implemented

Function

of an ECU

Missing or Incorrect

FunctionalitySide-Effect Behavior

Intended Behavior

Standard

(Positive) Testing

Standard Security

(Negative) Testing

Vulnerability Assessment

and Penetration Testing

Standard Security

(Positive) Testing

Implemented

Function

of an ECU

03-Apr-2019

C. Folda © Continental AG 25

Page 26: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Security Requirements

Standard Security Test

Penetration Test

Security TestingConclusion

› Penetration and Standard Security Tests influence each other over Security Requirements

› Example:

› The First Penetration Test has a very open Scope and has some findings

› These findings are translated to Security Requirements, Test Goals and Test Methods

› These new Requirements are covered afterwards with Standard Security Tests

› The next penetration Test Scope can be reduced and let the Penetration Test to focus on a more detailed level

03-Apr-2019

C. Folda © Continental AG 26

Page 27: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test 03-Apr-2019

27C. Folda © Continental AG

Agenda

Introduction1

Cyber Security Introduction2

Security Testing Introduction3

Example4

Page 28: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

ExampleScenario

› Scenario:

› Let’s assume we are developers of specific TLS libraries and deliver different Variants

and Systems to our Customers

› Heartbleed is not discovered yet

› Incident:

› An internal Penetration Tests finds a Security Vulnerability in the Heartbeat

functionality in our products (Heartbleed)

› They deliver a Test report and steps how to reproduce it

03-Apr-2019

C. Folda © Continental AG 28

Page 29: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

ExampleWhat is Heartbleed

SRC: Webcomic Series XKCD @ https://xkcd.com/1354/

03-Apr-2019

C. Folda © Continental AG 29

Page 30: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

ExampleApproach

1. Analyze the Report

2. Define and write Security Requirements

“The Server must not report with more characters than the requested String has”

3. Create automated Security Testcases to avoid to deliver this vulnerability again

Positive Test

• result = tls_heartbeed(„hat“, 3)if result == „hat“:

pass()else:

fail()

Security Test 1

• result = tls_heartbeed(„hat“, 500)if len(Result) != 3:

fail()else:

pass()

Security Test 2

• result = tls_heartbeed(„hat“, 0)if len(Result) != 3:

fail()else:

pass()

03-Apr-2019

C. Folda © Continental AG 30

Page 31: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Thanks for your attention!Questions?

03-Apr-2019

C. Folda © Continental AG 31

Page 32: From Requirement to Standard Security Test · 2019-04-12 · Public From Requirement to Standard Security Test Cyber Security Introduction Definition Cyber Security Cybersecurity,

Public

From Requirement to Standard Security Test

Regensburg HQ (Germany)

Bebra (Germany)

Ingolstadt (Germany)

Markdorf (Germany)

Hildesheim (Germany)

Rosenheim (Germany)

Vienna (Austria)

Toulouse (France)

Vila Real (Portugal)

Frenstat (Czech Republic)

Sibiu (Romania)

Timisoara (Romania)

Iaşi (Romania)

Novi Sad (Serbia)

Business Unit Body & SecurityIn global reach and proximity to our customers

Europe

Asia

South America

Detroit (USA)

Troy (USA)

Guadalajara Tijera (Mexico)

Nogales (Mexico)

Tlaxcala (Mexico)

Jacutinga (Brazil)

Guarulhos (Brazil)

São Paulo (Brazil)

North America

Chongqing(China)

Shanghai (China)

Suzhou (China)

Tianjin (China)

Changchun Moonlake (China)

Yokohama (Japan)

Singapore (Singapore)

Icheon (South Korea)

Bangalore (India)

Manila (Philippines)

R&D / Sales

Production

03-Apr-2019

C. Folda © Continental AG 32