towards a design theory for trustworthy...

21
©LJW, 2014 All Rights Reserved Towards a Design Theory for Trustworthy Information Systems Les Waguespack, Ph.D., Professor David J. Yates, Ph.D., Associate Professor William T. Schiano, DBA, Professor Computer Information Systems Bentley University Waltham Massachusetts HICSS-47 - Hawaii January 9, 2014 1 trustworthy Defense in Depth Defining Domains Simple Trusted Components Separation Linking Roles and Domains Least Privilege Assurance Manageable Access Risk Management Few Trusted Components Complete Mediation Auditing Authorizing Operations Identity Management Elegance predictability confidence divisibility factorability constructibility usability intuitiveness fidelity eectiveness robustness sustainability vitality scalability 30

Upload: vudieu

Post on 18-Apr-2018

220 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

©LJW, 2014 All Rights Reserved

Towards a Design Theory for Trustworthy Information

SystemsLes Waguespack, Ph.D., Professor

!David J. Yates, Ph.D., Associate Professor

!William T. Schiano, DBA, Professor

!!

Computer Information Systems Bentley University

Waltham Massachusetts !!

HICSS-47 - Hawaii January 9, 2014

�1

trustworthy

©LJW, 2013 All Rights Reserved

Defense in DepthDefining Domains

Simple Trusted

Components

SeparationLi

nkin

g R

oles

an

d D

omai

ns

Leas

t Pr

ivile

ge

Assura

nce

Manageable

AccessRisk Management

Few Trusted

Components

Complete

Mediation

Auditing

Auth

oriz

ing

Ope

ratio

ns

Identi

ty

Manag

emen

t

Elegance

predictability

confide

nce

divisibility

factorability

constructibility

usability

intuitiveness

fidelity

effectiveness

robustness

sustainability

vitality

scalability

�30

Page 2: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

©LJW, 2014 All Rights Reserved

...

Program Development by Stepwise Refinement - Wirth

1971

Designing Software for Ease of Extension and Contraction - Parnas

1979 1987

No Silver Bullet: Essence and Accidents... -

Brooks

Software Engineering

Cognitive Linguistics

Security Theory

1992

OO Patterns - Coad

1995

Design Patterns - GammaPattern Languages of Program Design - Coplien

1980

Metaphors We LIve By - Lakoff

1999

2000

Philosophy in the Flesh -

Lakoff

Where Mathematics Comes From - Lakoff

2010

Thriving Systems Theory & Metaphor-Driven

Modeling - Waguespack

2014

Trustworthy IS Design

Theory

1973

Secure Computer Systems: Mathematical Foundations - Bell / LaPadula

1976

A Lattice Model of Secure Information Flow - Denning

1991

Information Systems Security: A Comprehensive Model - McCumber

The Protection of Information

Systems - Saltzer

2003

Computer Security – Bishop

The Oregon Experiment

A Pattern Language

1977

A Timeless Way of Building

1979

The Phenomenon of Life

The Process of Creating of Life

The Luminous Ground

A Vision of a Living World

2005

2004

2002

Notes on the Synthesis of Form

1964 1975

The Nature of Order - Alexander

Thriving Systems

Threads of Theory in Design

Object Modeling

�2

Page 3: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

©LJW, 2014 All Rights Reserved

The current state of design thinking about security has led to many gaps in information systems security.

Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security(Organisation for Economic Co-operation and Development (2002)):

A “growing number and wider variety of threats and vulnerabilities” marks the Internet Age.

“Only an approach that takes due account of the interests of all participants, and the nature of the systems, networks, and related services, can provide effective security.”

We need a design theory for information systems and business models with principles of form and function:

1) that enable stakeholders to integrate the broad range of security concerns and potential responses,

2) in a balance that satisfies stakeholders’ objective and aesthetic conception of quality and trustworthiness.

Motivation

�3

Page 4: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

Policy

©LJW, 2014 All Rights Reserved

Assurance Engenders Trust

Mecha

nisms

Statement of requirements that explicitly defines the security expectations of the mechanism(s)

Executable entities that are designed and implemented to meet the requirements of the policy

Assura

nce

�4

Page 5: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

Policy

©LJW, 2014 All Rights Reserved

Assurance Engenders Trust

Mecha

nisms

Statement of requirements that explicitly defines the security expectations of the mechanism(s)

Executable entities that are designed and implemented to meet the requirements of the policy

Bishop, p. 479

Assura

nce

Provides justification that the mechanism meets policy through assurance evidence and approvals based on evidence

�4

Page 6: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

Policy

©LJW, 2014 All Rights Reserved

Security Management Sustains Trust

Mecha

nisms

The subjective, intention of the stakeholders defining satisfactory behavior

The objective, computational elements implementing the “physical” security model

Assura

nce

�5

Page 7: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

Policy

©LJW, 2014 All Rights Reserved

Security Management Sustains Trust

Mecha

nisms

The subjective, intention of the stakeholders defining satisfactory behavior

The objective, computational elements implementing the “physical” security model

Assura

nce

A dynamic alignment of policy and mechanisms responding to

emerging threats and evolving

requirements: environment and

technology

�5

Page 8: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

©LJW, 2014 All Rights Reserved

“Security policies are assumed to be internally consistent and to reflect the requirements of the organization to which they apply. Similarly, security mechanisms are assumed to work correctly and to perform the functions for which they are intended. These crucial aspects of trustworthiness are commonly glossed over because they are difficult to quantify or analyze. ”

Elisabeth SullivanPart 6, (Bishop (2002), Computer Security: Art and Science, Addison-Wesley, Boston, MA.)

Trust in information systems must be driven by a combination of:1) responding to the stakeholders’ tacit expectations and2) shaping those expectations by crafting a security model that

defines trustworthy systems behaviors and outcomes.

Trustworthy Systems

�6

Page 9: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

©LJW, 2014 All Rights Reserved

Thriving SystemsTheory

�7

Stepwise Refinement Modularization

CohesionEncapsulation

Com

posi

tion

of

Func

tion

Scal

e

Correc

tness

User

FriendlinessExtensibility

Patterns

ReliabilityTransparency

Prog

ram

mab

ility

Identi

ty

Elegance

Design Choice Properties in Confluence

Experienced as Design Quality

Page 10: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

“subjective” aesthetic

©LJW, 2014 All Rights Reserved

effe

ctive

ness

fidelity

“objective” structural

intuitiveness

usab

ility

predictability

confidence

cons

truct

ibilit

y

factorability

divisibility

sustainability

vitality

robustness scalability

thriving

Thriving SystemsTheory

�7

Stepwise Refinement Modularization

CohesionEncapsulation

Com

posi

tion

of

Func

tion

Scal

e

Correc

tness

User

FriendlinessExtensibility

Patterns

ReliabilityTransparency

Prog

ram

mab

ility

Identi

ty

Elegance

Page 11: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

Stepwise Refinement Modularization

CohesionEncapsulation

Com

posi

tion

of

Func

tion

Scal

e

Correc

tness

User

FriendlinessExtensibility

Patterns

ReliabilityTransparency

Prog

ram

mab

ility

Identi

ty

Elegance

©LJW, 2014 All Rights Reserved�8

Security Design Aspects

Defense in Depth Defining Domains Simple Trusted

Components

Separation

Link

ing

Rol

es

and

Dom

ains

Leas

t Pr

ivile

ge

Assura

nce

Manageable

AccessRisk Management

Few Trusted

Components

Complete

Mediation

Auditing

Auth

oriz

ing

Ope

ratio

nsIde

ntity

Manag

emen

t

Elegance

Security Principles and Protocols

Grouped by the Choice Property They

Express

Page 12: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

©LJW, 2014 All Rights Reserved�8

Security Design Aspects Defense in Depth: graduated protections in layers spanning application, platform and communication architecture

Defining Domains: a topological definition of protection by requirement where constituent elements are subject to consistent policy and protection mechanisms

Simple Trusted Components: a preference for atomic protection mechanisms and system elements

Separation: segregating protection domains and mediating their exchange of information, control and authority

Linking Roles & Domains: cascading authentication and separation of domains to attenuate privileges

Least Privilege: preferring that domain access spans the minimum range feasible to support required functionality

Assurance: evidence based monitoring of policy and protection mechanisms across domains

Manageable Access: coherent and user-accessible policy and protection mechanisms to manage and monitor domains

Risk Management: dynamic policy and protection specification supporting timely response to the changing threat landscape and evolving stakeholder intentions

Few Trusted Components: minimal and symmetric formulation of criteria, privilege and protection across domains

Complete Mediation: assured system-wide application and enforcement of protection mechanisms

Auditing: facility for threat identification and classification supporting forensics and ongoing policy review and evolution

Authorizing Operations: the ability to adjust the scope and depth of protection to meet stakeholder security concerns

Identity Management: comprehensive and definitive naming of system elements to allow application and assurance of security mechanisms

Elegance: protection mechanisms effectively, efficiently, and simply organized, realizing a security policy resonating with the stakeholder community’s conception of security and welfare

Defense in Depth Defining Domains Simple Trusted

Components

Separation

Link

ing

Rol

es

and

Dom

ains

Leas

t Pr

ivile

ge

Assura

nce

Manageable

AccessRisk Management

Few Trusted

Components

Complete

Mediation

Auditing

Auth

oriz

ing

Ope

ratio

nsIde

ntity

Manag

emen

t

Elegance

Security Principles and Protocols

Grouped by the Choice Property They

Express

Page 13: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

“subjective” aesthetic

effe

ctive

ness

fidelity

“objective” structural

intuitiveness

usab

ility

predictability

confidence

cons

truct

ibilit

y

factorability

divisibility

sustainability

vitality

robustness scalability

©LJW, 2014 All Rights Reserved

Defense in Depth Defining Domains

Simple Trusted

Components

Separation

Link

ing

Rol

es

and

Dom

ains

Leas

t Pr

ivile

ge

Assura

nce

Manageable

AccessRisk Management

Few Trusted

Components

Complete

Mediation

Auditing

Auth

oriz

ing

Ope

ratio

nsIde

ntity

Manag

emen

t

Elegance

trustworthy

“Trustworthy” SystemsTheory

Page 14: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

©LJW, 2014 All Rights Reserved

This is only a first step toward a design theory for trustworthy information systems.

Pedagogical applications of Thriving Systems Theory have shown positive results in improving student design performance but, we have no “industrial-strength” experience to this point.

Our next step is to develop a choice-property guided design methodology - ideally for artifact design and implementation in the “field.”

Framing security design through a lens of Thriving Systems Theory informs the security intentions and security mechanisms encompassing stakeholder, policy maker, and developer.

Our focus on artifact resonance with stakeholder intentions defines trustworthiness as a product of a subjective and objective portfolio of design concerns that must be managed in harmony.

Conclusion

�10

Page 16: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

handout - ©LJW, 2014 All Rights Reserved

HICSS47 - Towards a Design Theory for Trustworthy Information Systems Leslie J. Waguespack, David J. Yates & William T. Schiano Bentley University, Waltham, Massachusetts, USA [email protected] [email protected] [email protected]

Thriving Systems Theory

Choice Property

Design Action Action Definition Security Design Aspect

Modularization modularize employing or involving a module or modules as the basis of design or construction

Defining Domains: a topological definition of protection by requirement where constituent elements are subject to consistent policy and protection mechanisms

Cohesion factor express as a product of factors Simple Trusted Components: a preference for atomic protection mechanisms and system elements

Encapsulation encapsulateenclose the essential features of something succinctly by a protective coating or membrane

Separation: segregating protection domains and mediating their exchange of information, control and authority

Composition of Function

assemble fit together the separate component parts of (a machine or other object)

Linking Roles & Domains: cascading authentication and separation of domains to attenuate privileges

Stepwise Refinement

elaborate develop or present (a theory, policy, or system) in detail

Defense in Depth: graduated protections in layers spanning application, platform and communication architecture

Scale focus(of a person or their eyes) adapt to the prevailing level of light [abstraction] and become able to see clearly

Least Privilege: preferring that domain access spans the minimum range feasible to support required functionality

Identity identify establish or indicate who or what (someone or something) is

Identity Management: comprehensive and definitive naming of system elements to allow application and assurance of security mechanisms

Patterns pattern give a regular or intelligible form to Few Trusted Components: minimal and symmetric formulation of criteria, privilege and protection across domains

Programmability generalize make or become more widely or generally applicable

Authorizing Operations: the ability to adjust the scope and depth of protection to meet stakeholder security concerns

User Friendliness

accommodate fit in with the wishes or needs of Manageable Access: coherent and user-accessible policy and protection mechanisms to manage and monitor domains

Reliability normalize make something more normal, which typically means conforming to some regularity or rule

Complete Mediation: assured system-wide application and enforcement of protection mechanisms

Correctness align put (things) into correct or appropriate relative positions

Assurance: evidence based monitoring of policy and protection mechanisms across domains

Transparency expose reveal the presence of (a quality or feeling) Auditing: facility for threat identification and classification supporting forensics and ongoing policy review and evolution

Extensibility extend render something capable of expansion in scope, effect, or meaning

Risk Management: dynamic policy and protection specification supporting timely response to the changing threat landscape and evolving stakeholder intentions

Elegance coordinatebring the different elements of (a complex activity or organization) into a relationship that is efficient or harmonious

Elegance: protection mechanisms effectively, efficiently, and simply organized, realizing a security policy resonating with the stakeholder community’s conception of security and welfare

Abbreviated Bibliography Alexander C. The Nature of Order An

Essay on the Art of Building and the Nature of the Universe: Book I - The Phenomenon of Life, The Center for Environmental Structure, Berkeley, CA, 2002.

Bell, D. E., & LaPadula, L. J. “Secure Computer Systems: Mathematical Foundations,” Technical Report Mitre-2547, Vol. 1, Bedford, MA, USA, 1973.

Bishop, M. Computer Security: Art and Science, Addison-Wesley, Boston, MA, 2003.

Brooks F. P. “No Silver Bullet: Essence and Accidents of Software Engineering,” Computer, 20(4), 1987, pp. 9-19.

Lampson, B. W. “Computer Security in the Real World,” Computer, 37(6), 2004, pp. 37-46.

OECD. “Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security,” OECD, 2002, www.oecd.org/sti/ieconomy/1946962.doc, retrieved 20 August 2014.

Saltzer, J. H., & Schroeder, M. D. “The Protection of Information in Computer Systems,” Proceedings of the IEEE, 63(9), 1975, pp. 1278-1308.

Waguespack, L. J. Thriving Systems Theory and Metaphor-Driven Modeling, Springer, London, UK, 2010.

Waguespack, L. J., & Schiano, W. T. “Thriving Systems Theory: An Emergent Information Systems Design Theory,” in 46th Hawaii International Conference on Systems Sciences, 2014, pp. 3757-3766.

Trustworthiness: artifact resonance with stakeholder intentions as a product of a subjective and objective portfolio of design concerns managed in harmony.

Page 17: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

Stepwise Refinement Modularization

CohesionEncapsulation

Com

posi

tion

of

Func

tion

Scal

e

Correc

tness

User

FriendlinessExtensibility

Patterns

Reliability

Transparency

Prog

ram

mab

ility

Identi

tyElegance

handout - ©LJW, 2014 All Rights Reserved

HICSS47 - Towards a Design Theory for Trustworthy Information Systems Leslie J. Waguespack, David J. Yates & William T. Schiano Bentley University, Waltham, Massachusetts, USA [email protected] [email protected] [email protected]

“subjective” aesthetic

effe

ctive

ness

fidelity

“objective” structural

intuitiveness

usab

ility

predictability

confidence

cons

truct

ibilit

y

factorability

divisibility

sustainability

vitality

robustness scalability

©LJW, 2014 All Rights Reserved

Defense in Depth Defining Domains

Simple Trusted

Components

Separation

Link

ing

Rol

es

and

Dom

ains

Leas

t Pr

ivile

ge

Assura

nce

Manageable

AccessRisk Management

Few Trusted

Components

Complete

Mediation

Auditing

Auth

oriz

ing

Ope

ratio

nsIde

ntity

Manag

emen

tElegance

trustworthy

“Trustworthy” SystemsTheory

“objective” structural

“subjective” aesthetic

Thriving Systems Theory provides a vocabulary and framework for identifying and harmonizing security concerns in design decisions that align mechanisms with intentions to engender stakeholders’ trust in information systems. !By categorizing security protocols of policy and mechanism aligned with TST choice properties, stakeholders and designers can dynamically tune the balance of functionality with structures that protect confidentiality, integrity and availability. That balance produces a qualitative resonance, the experience of trustworthiness that combines the subjective (aesthetic) with the objective (computational) stakeholder expectations.

http://CIS.Bentley.EDU/LWaguespack/docpdffiles/HICSS47SLIDES.pdf

Page 18: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

generative activityactivity affect

environmental parameterconceptual metaphor

ontological primitive

A Special Ontology of Design

©LJW 2014

what

why how

costefficiency

to design (v)

effec

tiven

ess

to implem

ent

perc

eptio

n of

des

ign (n

)

abstr

act a

rtistr

y

metaphorical lens

satis

facti

on

Design

Page 19: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

what

why how

artifact

purpose

belief

need

process

method

craft

innovation

costefficiency

to design (v)

effec

tiven

ess

systemedifice

model

to implem

ent

perc

eptio

n of

des

ign (n

)

abstr

act a

rtistr

y

generative activityactivity affect

environmental parameterconceptual metaphor

scientific knowledge

culture

metaphorical lens

satis

facti

on

ontological primitive

A Special Ontology of Design

intention

©LJW 2014

Page 20: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

• A special ontology of design!

• constructs: why, how, what!

• The Why establishes the purpose of the artifact based on the intention and mindset of the designer!

• The How determines the mode of implementation of the artifact as process or methodology!

• The What is the product of the implementation that is the design effort’s attempt at addressing the intention!

• relationships!

• the Why informs the How through design (v)!

• the How produces the What as artifact, edifice, model or system!

• the Why perceives the What’s characteristics!

• the implementation of What bypassing design(v) might be called artistry where the intention is rendered directly in the artifact (given that any material art product involves some implementation if not “design(v)”)!

• modifiers!

• the Why is conditioned by scientific knowledge, culture and/or belief in forming intention!

• the conceptual metaphor is the designer’s mental model characterizing both the objective and subjective constructs to be produced in What by How!

• the conceptual metaphor translates the Why through design (v) to instruct the How!

• the How implements the What incurring cost and exhibiting efficiency!

• the What’s design(n) characteristics are perceived by the Why through the conceptual metaphor to interpret the What’s characteristics to exhibit satisfaction and/or effectiveness!

• the How is conditioned by existing craft that may be altered with implementation experience through innovation!

• The metaphorical lens is both the source of instruction between the Why and How as well as the standard for interpretation from which the assessment of satisfaction will be realized!

• It’s interesting to note that although the characteristics of What seem to be the focus of design(v), only How is engaged directly with Why. It is as though How is the object of design rather than What. What simply provides the test case (the design(n)) that is evaluated as consistent or not against the Why, the result of the conveyance of Why’s intention to How!?

©LJW 2014

Page 21: Towards a Design Theory for Trustworthy …cis.bentley.edu/lwaguespack/docpdffiles/HICSS47Slides.pdfof protection by requirement where ... Towards a Design Theory for Trustworthy Information

Organizations design artifacts."

Organizations design processes."

Perhaps the most important artifact organizations should design

is “why they design!”