2010-07-26 Ideashot!

Download Report

Transcript 2010-07-26 Ideashot!

Brainstorm on Security
José Fonseca
University of Coimbra
[email protected]
NAPOLI, 27TH JULY 2010
::.. Outline
• Threat Modeling
• IDS
• BSIMM
BRAINSTORM
ON
SECURITY
[1]
NAPOLI, 27TH JULY 2010
::.. Threat Modeling
•
Why the Threat Model? “You cannot build a secure
system until you understand your threats. It’s as
simple as that.” - Microsoft
•
Threat Model: process to identify and understand
security flaws in product design. It helps quantifying
the level of risk of the application
•
Useful for risk management and risk assessment
•
“From the security point of view Threat Modeling is
the most important aspect of the software design
process” - Microsoft
BRAINSTORM
ON
SECURITY
[2]
NAPOLI, 27TH JULY 2010
::.. Threat Model Example
BRAINSTORM
ON
SECURITY
[3]
NAPOLI, 27TH JULY 2010
::.. STRIDE Threat Categories
• Spoofing identity
• Tampering with data
• Repudiation
• Information disclosure
• Denial of service
• Elevation of privilege
BRAINSTORM
ON
SECURITY
[4]
NAPOLI, 27TH JULY 2010
::.. Intrusion Detection System
• Database data is critical for business
applications, such as the SWIM-SUIT
prototype
• How to protect from database attacks? Using
an IDS for databases
• IDS
•
•
SQL Commands
Database Transactions
BRAINSTORM
ON
SECURITY
[5]
NAPOLI, 27TH JULY 2010
::.. IDS for Databases
Web Database
application
DBMS
Intrusion Detection System
Database Interface
Learning
phase
Command
Capturing
Detection
phase
Detection
Parsing
Learning
BRAINSTORM
ON
SECURITY
Profiles
Action
[6]
NAPOLI, 27TH JULY 2010
::.. IDS Addressed to SWIM-SUIT
•
Correlate the IDS results with the Threat Model
•
Test the correctness of the IDS
•
Provide “intelligence” of the SWIM-SUIT insights at
the SQL and Transaction levels to the IDS
•
Discuss and define the best learning process (e.g.
using the test cases, manually executing the
functions, a mix of both, etc.)
BRAINSTORM
ON
SECURITY
[7]
NAPOLI, 27TH JULY 2010
::.. BSIMM
•
Building Security In Maturity Model (BSIMM)
•
Framework that allows to understand, measure and
plan a software security initiative
•
Can be used to asses the current degree of the
software security development as a baseline
•
Keeps track of the improvements of the development
process during its life cycle
BRAINSTORM
ON
SECURITY
[8]
NAPOLI, 27TH JULY 2010
::.. BSIMM Framework
Data from 30 firms:
•
Microsoft
•
Telecom Italia
•
Adobe
•
Google
•
Intel
•
Nokia
•
...
BRAINSTORM
ON
SECURITY
[9]
NAPOLI, 27TH JULY 2010
::.. BSIMM Framework
•
4 Domains – Major groups in the SSF
•
12 Practices – Categories of BSIMM activities (3
Practices for every Domain, each one with 3 levels)
•
109 Activities – Actions carried out by the SSG as
part of a Practice (15 core Activities)
BRAINSTORM
ON
SECURITY
[10]
NAPOLI, 27TH JULY 2010
::.. BSIMM Framework
Baseline Measurements
Current Measurements
BRAINSTORM
ON
SECURITY
[11]
NAPOLI, 27TH JULY 2010
::.. Questions and Feedback
BRAINSTORM
ON
SECURITY
[12]