A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and...
Transcript of A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and...
![Page 1: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/1.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
A Multidisciplinary Approach to Building Trustworthy Secure Systems
Protecting the Nation’s Critical Assets in the 21st Century
Dr. Ron RossComputer Security DivisionInformation Technology Laboratory
![Page 2: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/2.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 2
OPM.Anthem BCBS.
Ashley Madison.
![Page 3: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/3.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3
Our appetite for advanced technology is rapidly exceeding our
ability to protect it.
![Page 4: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/4.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4
Complexity.
![Page 5: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/5.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 5
Kinetic space.
![Page 6: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/6.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 6
Cyber space.
![Page 7: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/7.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 7
Sharks and glaciers.
![Page 8: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/8.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
The n+1 vulnerabilities problem.
![Page 9: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/9.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
SystemHarden the
targetLimit damage to the target
Make the target survivable
Reducing susceptibility to cyber threats requires a
multidimensional systems engineering approach.Security Architecture
and Design
Achieving Trustworthiness and Resiliency
![Page 10: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/10.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 10
Security.An emergent property.
![Page 11: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/11.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 11
Risk assessment.
![Page 12: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/12.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 12
Assets and consequences.
![Page 13: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/13.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 13
Engineer up.
![Page 14: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/14.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 14
05.04.16
![Page 15: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/15.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
NIST Special Publication 800-160
Systems Security EngineeringConsiderations for a Multidisciplinary Approach in the
Engineering of Trustworthy Secure Systems
![Page 16: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/16.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 16
Multidisciplinary integration of security best practices.
![Page 17: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/17.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 17
Command and control of the security space.
![Page 18: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/18.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 18
Technical Processes Business or mission analysis Stakeholder needs and requirements definition System requirements definition Architecture definition Design definition System analysis Implementation Integration
Verification Transition
Validation Operation
Maintenance Disposal
ISO/IEC/IEEE 15288:2015Systems and software engineering — System life cycle processes
![Page 19: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/19.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 19
Nontechnical Processes Project planning Project assessment and control Decision management Risk management Configuration management Information management Measurement Quality assurance
Acquisition and Supply Life cycle model management
Infrastructure management Portfolio management
Human resource management Quality management Knowledge management
ISO/IEC/IEEE 15288:2015Systems and software engineering — System life cycle processes
![Page 20: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/20.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 20
A few examples.
![Page 21: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/21.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 21
“The purpose of the Human Resource Management process is to provide the organization with necessary human resources and to maintain their competencies, consistent with business needs.”-- ISO/IEC/IEEE 15288-2015.
Reprinted with permission from IEEE, Copyright IEEE 2015, All rights reserved.
Human ResourceManagement Process
Systems Engineering View
![Page 22: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/22.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 22
“Systems security engineering, as part of the Human Resource Management process, defines the security criteria for the qualification, assessment, selection, and ongoing training of skilled and experienced personnel qualified to perform the security aspects of life cycle processes to achieve organization, project, and stakeholder security objectives.”-- NIST Special Publication 800-160.
Human ResourceManagement ProcessSystems Security Engineering View
![Page 23: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/23.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 23
Systems security engineering skills required by projects are identified.
Individuals with systems security engineering skills are provided to projects.
Systems security engineering skills of personnel are developed, maintained or enhanced.
Systems Security Engineering HR Management Process Outcomes
![Page 24: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/24.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 24
HR-1 IDENTIFY SYSTEMS SECURITY ENGINEERING SKILLS
HR-1.1 Identify systems security engineering skills needed based on current and expected projects.
Elaboration: Systems security engineering skills needed include foundational skills that span systems engineering and security specialties, and security specialty skills determined by current and expected project needs.
HR-1.2 Identify existing systems security engineering skills of personnel.
Elaboration: Skills identified include all relevant systems engineering and specialty security engineering, technology, and related skills.
References: ISO/IEC/IEEE 15288, Section 6.2.4.3 a).
Related Publications: ISO/IEC 12207, Section 6.2.4.3.1; National Cybersecurity Workforce Framework; DoD Directive 8140.01; ISO/IEC 27034-1, (SDL) Section A.9.1.
Human Resource Management ProcessSecurity-Related Activities and Tasks
![Page 25: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/25.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 25
“The purpose of the Stakeholder Needs and Requirements Definition process is to define the stakeholder requirements for a system that can provide the capabilities needed by users and other stakeholders in a defined environment.”-- ISO/IEC/IEEE 15288-2015.
Reprinted with permission from IEEE, Copyright IEEE 2015, All rights reserved.
Stakeholder Needs and Requirements Definition Process
Systems Engineering View
![Page 26: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/26.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 26
“Systems security engineering, as part of the Stakeholder Needs and Requirements Definition process, defines the stakeholder security requirements that provide the protection capability and security characteristics for the system in satisfaction of all needs of users and other stakeholders…”-- NIST Special Publication 800-160.
Stakeholder Needs and Requirements Definition Process
Systems Security Engineering View
![Page 27: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/27.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 27
The specific security interests of stakeholders of the system are identified.
Stakeholder assets and assets classes are identified.
Asset susceptibility to adversity and uncertainty is determined.
Asset protection priorities and protection assurances are determined.
Stakeholder protection needs are defined and prioritized.
Systems Security Engineering Stakeholder Needs and Requirements
Definition Process Outcomes
![Page 28: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/28.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 28
SN-2 DEFINE STAKEHOLDER PROTECTION NEEDS
SN-2.2 Identify stakeholder assets and asset classes.
Elaboration: Assets include all tangible and intangible assets. The assets and asset classes are identified in consideration of all stakeholders and all contexts in which assets are used by the system-of-interest. This includes the business or mission; the enabling systems of the system-of-interest; the other systems that interact with the system-of-interest; and stakeholders whose assets are utilized by the business or mission and/or by the system-of-interest.
SN-2.5 Identify stakeholder protection needs.
Elaboration: Stakeholder protection needs are identified in terms of the loss consequences realized by stakeholder relative to assets and the events that produce the loss consequences. Protection needs should be identified in a manner consistent with how stakeholders manage the assets. The protection needs are identified in dimensions that are consistent with the loss concerns (e.g., loss of control, loss of ownership, loss as in destruction) so as to account for varying needs across varying concerns.
References: ISO/IEC/IEEE 15288, Section 6.4.2.3 b); ISO/IEC 15026; ISO/IEC 25010; ISO TS 18152; ISO/IEC 25063.
Related Publications: FIPS Publication 199; NIST SP 800-37 (RMF Step 1).
Stakeholder Needs and Requirements Definition Process
Security-Related Activities and Tasks
![Page 29: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/29.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 29
References and Related Publications Sections
Incorporating by reference and aligning, national and international security standards, guidelines, frameworks, and best practices.
30 ISO/IEC/IEEE 15288 Engineering Process Steps
Demonstrating in a transparent and inclusive manner, that multiple security solutions and approaches can be employed to achieve trustworthy resilient systems.
![Page 30: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/30.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 30
References Roles, Responsibilities, and Skills Design Principles for Security Engineering and Security Fundamentals System Resiliency Security Requirements Considerations Software Security and Assurance Hardware Security and Assurance System Security Analyses RMF Application
AppendicesA Wealth of Trusted Systems Development Principles, Concepts, and Best Practices
![Page 31: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/31.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 31
Some final thoughts.
![Page 32: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/32.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 32
The Cold War.
![Page 33: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/33.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Institutionalize.
The ultimate objective for security.
Operationalize.
![Page 34: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/34.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Leadership.Governance.
Accountability.
![Page 35: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/35.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Security should be a by-product of good design and development practices—integrated throughout the system life cycle.
![Page 36: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/36.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 36
Security is a team sport.
Industry
Government Academia
![Page 37: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/37.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Race to the TopBetter Security Through Engineering
![Page 38: A Multidisciplinary Approach to Building Trustworthy Secure ...ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NATIONAL INSTITUTE OF STANDARDS](https://reader034.fdocuments.in/reader034/viewer/2022042712/5f93d1a5d8da26166a2e4def/html5/thumbnails/38.jpg)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 38
Ron Ross100 Bureau Drive Mailstop 7730Gaithersburg, MD USA 20899-7730
Email [email protected] (301) 651.5083
LinkedIn Twitterwww.linkedin.com/in/ronrossnist @ronrossecure
Web Commentscsrc.nist.gov [email protected]
We are here to help you be more secure…