1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information...

16
1 del based Risk Assessment fo del based Risk Assessment fo endable Critical Infrastruct endable Critical Infrastruct Business and Information Technology Department Business and Information Technology Department Central Laboratory of the Research Councils Central Laboratory of the Research Councils Rutherford Appleton Laboratory, UK Rutherford Appleton Laboratory, UK Theo Dimitrakos Theo Dimitrakos

Transcript of 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information...

Page 1: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

1

Model based Risk Assessment for Model based Risk Assessment for

Dependable Critical InfrastructuresDependable Critical Infrastructures

Business and Information Technology DepartmentBusiness and Information Technology DepartmentCentral Laboratory of the Research CouncilsCentral Laboratory of the Research CouncilsRutherford Appleton Laboratory, UKRutherford Appleton Laboratory, UK

Theo DimitrakosTheo Dimitrakos

Page 2: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

2

Model based Risk Assessment (why?)

The increasing complexity of today's IT dependent systems urges the improvement of existing methods for analysing systems and their models in order to increase the likelihood that important threats and vulnerabilities are taken into consideration.

Such an improvement can be achieved by

1. combining different complementary risk assessment methodologies with respect to the system architecture, implementation, and use;

2. assessing all different aspects of dependability (e.g. availability, safety, security, survivability, etc.) and their impact on each other with respect to the sytem architecture implementation, and use;

3. providing light-weight and extensible tool inclusion frameworks supporting the co-use and/or integration of risk analysis, system design and real-time monitoring tools.

Qualitative methodologies for analysing risk lack the ability to account for the dependencies between events, but are effective in identifying potential hazards and failures in trust within the system, whereas tree-based techniques take into consideration the dependencies between each event.

All aspects of dependability should be considered together as a coherent whole. A coherent analysis of all aspects of dependability is by far more effective than the sum of the analyses of each aspect in isolation.Also consistent with DeSIRE objectives and the findings of the Roadmap projects

The complexity of today’s IT dependent systems increases the complexity of the risk of analysis tasks and demands for the co-use and/or integration various tools providing clear and easy-to explore view of the system at hand, as well as, tools supporting specific risk analysis methods and tasks

Page 3: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

3

Model based Risk Assessment Tool inclusion platforms

• It is more cost-efficient to integrate specialised tools (which have been developed and test over decades and people are familiar with) rather than re-invent tool support in the context of an integrated methodology.

– A plethora of system design, modelling and system analysis tools,– A significant number of specialised risk assessment tools

• A tightly integrated tool-chain is not necessary the best solution– Different enterprises have often their own legacy systems for design and/or risk

assessment while the design and risk assessment tool specifications often change without preserving backwards compatibility.

• A “loose” tool inclusion platform – based on standardised representations of modelling and risk assessment meta-data – allow users to plug-in their preferred tools using commonly agreed or standardised and

extensible exchange formats.

Page 4: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

4

Model based Risk Assessment does a “Dependability” IP context add value?

The new Integrated Project instrument presents an opportunity to build a programme of the required scale, breath of vision and expertise in order to overcome the compromises to the effectiveness of risk assessment introduced at the boundaries of partial solutions addressing a single aspect of dependability, while it provides a useful context for developing a tool integration platform in close collaboration with method integration.

Page 5: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

5

Model based Risk Assessment does a “Dependability” IP context add value?

• The optimisation and deployment of a Model-based Risk Assessment methodology integrating different complementary risk assessment methodologies on the basis of a system model;

• The extension and generalisation of a Model-based Risk Assessment methodology (developed for risk analysis of security critical systems) to a coherent framework covering all different aspects of dependability (e.g. availability, safety, security, survivability, etc.) and their impact on each other with respect to the system architecture implementation, and use;

• The extension of a platform for tool inclusion which currently provides support for Model-based Risk Analysis by means of repositories storing assessment results and reusable modelling elements, to a full-fledged tool integration platform based on standardised representations of modelling and risk assessment meta-data which allow users to plug-in and co-use their preferred tools using commonly agreed or standardised and extensible exchange formats.

Page 6: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

6

Model-based Risk AnalysisModel-based Risk Analysis

Why use it?Why use it?The model-based approach improves the quality and effectiveness of the risk assessment process by facilitating precision, communication and interaction between stakeholders and reduces maintenance costs by increasing the possibilities for reuse

What does it offer?What does it offer?The model-based approach provides a semantically rich, uniform, streamlined approach for each stage in a risk assessment project, from context identification, through risk assessment, analysis and treatment to presentation of the results

Page 7: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

7

The CORAS FrameworkThe CORAS FrameworkA model-based risk assessment methodology combining

features from partly complementary risk assessment methods (e.g. HazOp, FTA, FMECA, Markov, etc.) as well as patterns and methodology from graphical information systems modelling (e.g. UML).

A risk documentation framework based on an extension of the ISO standard RM-ODP (Reference

Model for Open Distributed Processing) with Risk Analysis specific concerns.

An integrated risk management and systems development process based on the UP (Unified Process)

for information systems development, and integrating several complementary widely applicable risk

assessment methods.

A platform for tool-inclusion based on XML (eXtensible Markup Language) technology allowing the integration of tools from both the risk analysis and the information systems modelling domains.

A risk management process based on the international security risk management standards AS/NZS

4360 and ISO/IEC 17799.

Page 8: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

8

The CORAS trialsThe CORAS trials

Virtual Shopping Operator

Online Sales Negotiator

Shopping Recommender

Consumer & Product Information

Personalised Store Visualiser

CORAS is being applied to the electronic retail market subsystem of an e-commerce platform, developed in another European Union IST project.

The security assessments focus on •the user authentication mechanism, •the secure payment mechanism and•the use of software agents for accomplishing specialised purchasing tasks,

offering a process for identifying and assessing potential solutions

CORAS in E-Commerce

Page 9: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

9

The CORAS trialsThe CORAS trials

CORAS in Telemedicine

CORAS is being applied to the regional health network HYGEIAnet that links hospitals and public health centres in Crete

CORAS provides the security assessment of the Cretan health care structure that consists of a number of geographically separated health care centres in a hierarchical organisation

CORAS offers a process of identification and assessment of potential solutions

Page 10: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

10

Tool inclusion platform (present plan)

The CORAS tool inclusion platform is being built around internal data representations expressed in XML and is realised by means of three interfaces for XML based data exchange:

• An interface based on IDMEF and developed by the Intrusion Detection Working Group. (Intrusion Detection Exchange Format).

• An Interface based on XMI (XML Metadata Interchange) which is an exchange format for UML modelling tools standardised by the Object Management Group.

• An interface targeting risk assessment tools which (in the absence of any exchange format standard) is based on a proprietary meta-data presentation of the core data elements of a large number of security and safety risk analysis methods.

Page 11: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

11

Tool inclusion platform (present plan)

(1) An assessment repository storing the concrete results from already completed assessments and assessments in progress.

(2) A reusable modelling elements repository storing reusable models, patterns and templates from predefined or already completed risk assessments.

At present the implementation of the deployment model depicted in the following slide is in progress.

Page 12: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

12

The CORAS FrameworkThe CORAS Framework

XMIOutput

Security Critical System

XML Data

IDMEF Data

IDMEF Data

Assessment Team

Page 13: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

13

Working together …We are actively seeking opportunities for cooperation with technology providers and end-user organisations within its main application domains: e-commerce and telemedicine.

Technical cooperation may target at the further development of our tools and methods.

Government and businesses may take advantage of the technology in order to improve their mission critical risk assessment while evaluating our approach.

Page 14: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

14

MbRA interoperabilityMbRA interoperability

XMIOutput

Security Critical System

XML Data

IDMEF Data

IDMEF Data

Assessment Team

SemanticContent

Contact: Theo [email protected]

Page 15: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

15

The CORAS consortiumhttp://www.nr.no/coras

CLRC Rutherford Appleton Lab. [UK] R&D

Computer Technology Institute [Gr] IT Academic

Institute for Energy Technology [No] R&D

INTRACOM [Gr] Commercial

National Centre for Telemedicine [No] MedicalSchool of Medicine, Univ, of Crete [Gr] Medical (subcontractor)

Norwegian Computing Centre [No] R&D

University of London (QMW) [UK] IT Academic

SINTEF [No] R&D

SOLINET [DE] Commercial

TELENOR [No] Commercial

FORTH [Gr] R&D

Page 16: 1 Model based Risk Assessment for Dependable Critical Infrastructures Business and Information Technology Department Central Laboratory of the Research.

16

Related resources• Recent R&D work in the context of the IST project CORAS (http://www.nr.no/coras and

http://www.bitd.clrc.ac.uk/Activity/CORAS ) has focused on the practical use of the Unified Modelling Language (UML) and the Unified Process (UP) as a common modelling reference for security risk assessment, and its use as a common reference for the integration of several complementary widely applicable risk assessment methods.

• Other related or complementary work includes the following ongoing or recently completed projects with whom we could consider collaborating within DeSIRE.

• UML-TRUST http://www.eti.pg.gda.pl/KATEDRY/kzi/en/research/uml_trust.html which issupporting development of Trust Cases for systems following object-oriented development based on UML. Part of the project is carried out within the project is carried out within the EU IST-1999- 12040 DRIVE http://www.e-mathesis.it/drive/

• UML-HAZOP http://www.eti.pg.gda.pl/KATEDRY/kzi/en/research/uml_hazop.html which is focusing on applying HazOp studies to UML models in order to discover hazards and anomalies. Part of the project is carried out within the project is carried out within the EU IST-1999-12040 DRIVE http://www.e-mathesis.it/drive/

• RSDS which focuses in providing tools for the specification of reactive systems in a fragment of UML (with prorpietary formal semanics) and their translations into the B formal method while supporting risk analysis by means of applying keyword-driven HazOp over the formal specification and its graphical visualisation. Tools are available at http://www.dcs.kcl.ac.uk/pg/kelly/index.html

• ALTERNATIVE http://www.smsss.surrey.ac.uk/Alternative/AlternativeProject.asp who are providing a web-enabled tool to manage risk assessment with respect to the deployment, hosting and integration of business critical information systems by application service providers.

• RiskGuide http://mkzlway.eti.pg.gda.pl/RiskGuide who are developing a tool supported project risk management methodology for software procurement and development projects