security testing improvement profile (stip) · security testing solutions for six industrial...

16
Security Testing Improvement Profile (STIP) Jürgen Großmann, Fraunhofer FOKUS, [email protected] An evaluation scheme for security testing SASSI13 – Security Assessment for Systems, Services and Infrastructures September 2013 at the Technical University (TU) in Berlin

Upload: others

Post on 20-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

Security Testing Improvement Profile (STIP)

Jürgen Großmann, Fraunhofer FOKUS, [email protected]

An evaluation scheme for security testingSASSI13 – Security Assessment for Systems, Services and InfrastructuresSeptember 2013 at the Technical University (TU) in Berlin

Page 2: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

Motivation

Technical Guide to Information Security Testing and Assessment NIST Special Publication 800-115

Page 3: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

TMMi, TPI© and TPI NEXT©

\

• TPI, TPI Next are registered trademarks of Sogeti

• TMMi is based on CMM, anddeveloped by the Illinois Institute of Technology The TMMi Model from http://www.tmmi.org/

Page 4: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

§ Analysis with respect of the key areas§ Levels are used to assign a degree of maturity to each key area§ Checkpoints are defined to determine the level for each key area§ Each higher level is better than its prior level in terms of time (faster), money

(cheaper) and/or quality (better).

Maturity Scale § Staged representation:

§ Initial§ Controlled§ Efficient§ Optimizing

§ Continuous representation§ A – M or 1 -13

TPI© and TPI NEXT©

KeyAreas

MaturityLevels

ImprovementSuggestionsCheckpoints

Page 5: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

Security Testing Improvement Profiles (STIP) enables an objective, detailed analysis and evaluation of security testing processes

§ First introduced to evaluate the case studies of the DIAMONDS project

§ Provide a detailed analysis and evaluation of our research & development

§ Show how tools & techniques have evolved§ Provide a template for other on how to pragmatically integrate the

DIAMONDS results to improve security testing processes on hand.

Security Testing Improvement Profile (STIP)Evaluation of the DIAMONDS Case Studies

Analysis with respect of the key areas§ Levels are used to assign a degree of progress to each key

area§ Each higher level is considered better than its prior level in

terms of quality (e.g. exactness of the outcome) or effectiveness (e.g. automation of activities).

Page 6: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards
Page 7: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

STIP key areas

Inceptionandtargetanalysis

Informationgathering

Securityriskassessmenttechnique

Securityriskassessmentscope

Securitytestidentification

Elaborationandexecution

Testdepth

Generationofsecuritytestmodels

Securitytestgeneration

Securitytestexecutionautomation

TestTechniques

Securityfunctionaltesting

Fuzzing

Securitypassivetesting/securitymonitoring

Staticsecuritytesting

Artifactconsistencyandtoolsupport

Securitytesttoolintegration

Traceability&test

coverage

Page 8: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

STIP level definitionKey area: Risk Assessment Technique

A:Informalsecurityriskassessment

Atthislevel,thesecurityriskassessmentisconductedinanunstructuredmannerwithoutaspecificnotation/languagefordocumentriskassessmentresultsoraclearlydefinedprocessforconductingthesecurityriskassessment.

B:Model-basedsecurityriskassessment

Atthislevel,thesecurityriskassessmentisconductedwithalanguagefordocumentingassessmentresultsandaclearlydefinedprocessforconductingtheassessment.

C:Modelandtest-basedsecurityriskassessment

Atthislevel,themodel-basedsecurityriskassessmentusestestingforverifyingthecorrectnessoftheriskassessmentresults.

Page 9: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

STIP level definitionsKey area: Security Test Identification

A: Identificationbasedonrequirementsanalysis

Testidentificationcanbebasedontheanalysisofthefunctionalsecurityrequirements(SFR)andtheircoveragethroughtesting.Oftentheserequirementshaveprioritynumbersthatadditionallyprovideguidanceontheimportanceofarequirementandtherelatedtestpurpose.

B: Identificationbasedonthreat/vulnerabilitymodels

Securitythreat/vulnerabilitymodelsadditionallyallowfortheidentificationofpenetrationteststhatarebasedonestimationsonpotentialthreatsandpotentialvulnerabilities.Thisallowstestingforunwantedincidentsthatarenotcoveredbythesecurityfunctionalrequirements.

C: Identificationbasedonthreat/vulnerabilitymodelsandtestpattern

Thecombinationofthreat/vulnerabilitymodelsandtestpatternadditionallyprovidesbestpracticesfortheidentificationandselectionoftestingmeansdedicatedtowell-knownclassesofthreatsorvulnerabilities.Thisapproachprovidesextensiveguidancetoidentifyadequatetestpurposesandtoapplyapprovedsecuritytestingmethods,techniquesandtools.

D: Risk-basedsecuritytestidentification+prioritization

Risk-basedsecuritytestidentificationandprioritizationcombinestheadvantagesofLevel3withaprioritizationofthetestpurposesbyconsideringprobabilitiesoftheunwantedincidentandestimationsontheirconsequences(quantifiedsecurityrisks).Theintegrationoftestidentificationwithsecurityriskassessmentallowsforaproblemandbusinessspecificprioritizationoftheidentifiedtestspurposesandtestingapproaches.

Page 10: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

Analysis and improvement suggestions

• A security testing matrix defines the current state of a process (blue background).

• Profiles define optimal and well aligned security testing levels (red line).• Improvements suggestions are to be defined on basis of dependencies

between key areas and their levels (red background)• e.g. Security test identification B requires Security risk assessment

technique B (green arrow)

Page 11: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

Securitytestingsolutionsforsixindustrialdomainsin8casestudies

• Banking• Automotive• Radioprotocols• Smartcards• Telecommunication• Industrialautomation

Application of STIP Evaluation of the DIAMONDS case studies

Page 12: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards
Page 13: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

Evaluation of the DIAMONDS Case StudiesSTIP results for the international case studies

Page 14: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

Evaluation of the DIAMONDS Case StudiesProgress in all case studies

Page 15: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

Banknote processing machine case study

Page 16: Security Testing Improvement Profile (STIP) · Security testing solutions for six industrial domains in 8 case studies • Banking • Automotive • Radio protocols • Smart cards

§ STIP is an evaluation and improvement scheme for security testing processes§ First introduced to evaluate the case studies of the DIAMONDS project§ Provide a detailed analysis and evaluation of security testing processes on hand§ Provide a template to pragmatically improve security testing processes on hand

§ First version is available at http://www.itea2-diamonds.org/evaluation/stip/index.html§ Can be used in addition to TMMi or TPI to emphasize security testing aspects.§ FOKUS plans to offer consultancy and certification optinos on basis of STIP in the near

future

Contact:Jürgen GroßmannFraunhofer Institute for Open Communication Systems FOKUSMOTION – Modeling and Testing for System and Service SolutionsKaiserin-Augusta-Allee 31, 10589 Berlin, GermanyE-Mail: [email protected]

Summary & Conclusion