Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves...

51
1 ICT Security analysis: CORAS in seven steps November 06, 2009 Ketil Stølen, SINTEF & UiO

Transcript of Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves...

Page 1: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

1ICT

Security analysis:CORAS in seven steps

November 06, 2009

Ketil Stølen, SINTEF & UiO

Page 2: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

2ICT

The seven steps of a security analysis in CORAS

Page 3: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

3ICT

Step 1: Introduction

The first step involves an introductory meeting. The main item on the agenda for this meeting is to get therepresentatives of the client to present their overall goals of the analysis and the target they wish to have analysed. Hence, during the initial step the analysts will gatherinformation based on the client's presentations and discussions.

Page 4: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

4ICT

Tasks

The security analysis method is introduced.The client presents the goals and the target of theanalysis.The focus and scope of the analysis is set.The meetings and workshops are planned.

Page 5: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

5ICT

People that should participate

Analysis leader (required)Analysis secretary (required)Representatives of the client:

Decision makers (required)Technical expertise (optional)Users (optional)

Page 6: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

6ICT

Modelling guideline

At this early stage of the analysis it can be useful to describe the target with informal like drawings, pictures or sketches on a blackboard.The presentation can later be supplemented with more formal modelling techniques such as UML or data flow-diagram.

Page 7: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

7ICT

Telemedicine case

Page 8: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

8ICT

Step 2: High level analysis

The second step also involves a separate meeting withrepresentatives of the client. However, this time the analysts will present theirunderstanding of what they learned at the rst meeting and from studying documentation that has been madeavailable to them by the client. The second step also involves a rough, high-level securityanalysis. During this analysis the first threats, vulnerabilities, threatscenarios and unwanted incidents are identied. They will be used to help directing and scoping the more detailed analysis still to come.

Page 9: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

9ICT

Tasks

The target as understood by the analysts is presented.The assets are identied.A high-level analysis is conducted.

Page 10: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

10ICT

People that should participate

Security analysis leader (required)Security analysis secretary (required)Representatives of the client:

Decision makers (required)Technical expertise (required)Users (optional)

Page 11: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

11ICT

Modelling guideline for the target description

Use a formal or standardised notation such as UML, but ensure thatthe notation is explained thoroughly so that the participantsunderstand it.Create models of both the static and the dynamic features of thetarget. Static may be hardware congurations, network design etc., whiledynamic may be work processes, information ow etc.For the static parts of the description UML class diagrams and UML collaboration diagrams (or similar notations) are recommended.For the dynamic parts we recommend UML activity diagrams and UML sequence diagrams (or similar notations)

Page 12: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

12ICT

Modelling guideline for asset diagrams

Draw a region that logically or physically represents thetarget of analysis.Place the direct assets within the region.Place the indirect assets outside the region. Indirectassets are a harmed as a consequence of a direct assetbeing harmed rst.Indicate with arrows how assets may aect other assets.Assets may be ranked according to their importance.If the analysis has more than one client, the clients shouldbe associated with their assets.

Page 13: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

13ICT

Page 14: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

14ICT

Page 15: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

15ICT

Page 16: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

16ICT

Asset diagram

Page 17: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

17ICT

High-level risk table

Page 18: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

18ICT

Step 3: Approval

The third step involves a more refined description of thetarget to be analysed, and also

all assumptions being made and other preconditions made.

Step three is terminated once all this documentation has been approved by the client.

Page 19: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

19ICT

Tasks

The client approves target descriptions and assetdescriptions.The assets should be ranked according to importance.Consequence scales must be set for each asset within thescope of the analysis.A likelihood scale must be defined.The client must decide risk evaluation criteria for eachasset within the scope of the analysis.

Page 20: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

20ICT

People that should participate

The same as in the previous meeting, but since this stepsets the boundaries for the further analysis it is importantthat the relevant decision-makers are present.

Page 21: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

21ICT

Asset table

Page 22: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

22ICT

Consequence scale for ”health records”

Page 23: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

23ICT

Likelihood scale

Page 24: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

24ICT

Risk evaluation matrix

Page 25: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

25ICT

Step 4: Risk identification workshop

This step is organised as a workshop gathering peoplewith expertise on the target of evaluation. The goal is to identify as many potential unwantedincidents as possible, as well as threats, vulnerabilitiesand threat scenarios.

Page 26: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

26ICT

Tasks

The initial threat diagrams should be completed withidentied threats, vulnerabilities, threat scenarios and unwanted incidents.

Page 27: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

27ICT

People that should participate

Security analysis leader (required)Security analysis secretary (required)Representatives of the client:

Decision makers (optional)Technical expertise (required)Users (required)

Page 28: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

28ICT

Modelling guideline for threat diagrams

Use the region from the asset diagram and add more regions ifnecessary.Model different kinds of threats in separate diagrams. Assets are listed to the right, outside the region.Threats are placed to the left in the region; threats that can be classified as external are placed outside the region.Unwanted incidents are placed within the region with relations to theassets they impact.Assets that are not harmed by any incidents are removed from thediagram.Add threat scenarios between the threats and the unwanted incidentsin the same order as they occur in real time (i.e. in a logicalsequence).Insert the vulnerabilities before the threat scenario or unwantedincident they lead to.

Page 29: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

29ICT

Symbols from the CORAS risk modellinglanguage

Page 30: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

30ICT

Initial threat diagram: accidental actions

Page 31: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

31ICT

Initial threat diagram: deliberate actions

Page 32: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

32ICT

Initial threat diagram: non-human threats

Page 33: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

33ICT

Final threat diagram: accidental actions

Page 34: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

34ICT

Step 5: Risk Estimation Workshop

The fifth step is also organised as a workshop. This time with focus on estimating consequences and likelihood values for each of the identied unwantedincidents.

Page 35: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

35ICT

Tasks

Every threat scenario must be given a likelihood estimateand unwanted incident likelihoods are based on these.Every relation between an unwanted incident and an assetmust be given a consequence estimate.

Page 36: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

36ICT

People that should participate

Security analysis leader (required)Security analysis secretary (required)Representatives of the client:

Decision makers (required)Technical expertise regarding the target (required)Users (required)

Page 37: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

37ICT

Modelling guideline

Risk estimation on threat diagrams:Add likelihood estimates to the threat scenarios.Add likelihood estimates to the unwanted incidents, based on thethreat scenarios.Annotate each unwanted incident-asset relation with a consequence taken from the respective asset's consequencescale.

Page 38: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

38ICT

Threat diagram with likelihood and consequence estimates

Page 39: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

39ICT

Combined likelihood estimates

Page 40: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

40ICT

Step 6: Risk Evaluation

This step involves giving the client the first overall risk picture.This will typically trigger some adjustments and corrections.

Page 41: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

41ICT

Tasks

Likelihood and consequence estimates should be confirmed or adjusted.The final adjustments of the acceptable area in the risk matrices should be made (if needed).An overview of the risks may be given in a risk diagram.

Page 42: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

42ICT

People that should participate

Security analysis leader (required)Security analysis secretary (required)Representatives of the client:

Decision makers (required)Technical expertise regarding the target (optional)Users (optional)

Page 43: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

43ICT

Modelling guideline for risk diagrams

Use the threat diagram and replace all unwanted incidentswith risk symbols, showing a short risk description and whether the risk is acceptable or not.Remove threat scenarios and vulnerabilities, but keep therelations between the threats and the risks.If useful, split the risk diagrams into several diagrams according to type of threat, part of the target or assetimportance (e.g. show all risks related to network, all risks for specic assets etc.).

Page 44: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

44ICT

Risk evaluation matrix with risks

Page 45: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

45ICT

Risk overview diagram

Page 46: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

46ICT

Step 7: Risk treatment workshop

The last step is devoted to treatment identication, as wellas addressing cost/benefit issues of the treatments. This step is best organised as a workshop.

Page 47: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

47ICT

Tasks

Add treatments to threat diagrams.Estimate the cost/benet of each treatment and decidewhich ones to use.Show treatments in risk overview diagrams.

Page 48: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

48ICT

People that should participate

Security analysis leader (required)Security analysis secretary (required)Representatives of the client:

Decision makers (required)Technical expertise (required)Users (required)

Page 49: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

49ICT

Modelling guideline

Treatment diagrams:Use the threat diagrams as a basis and annotate all arrows from unwanted incidents to assets with risk icons. Show only theunacceptable risks.Annotate the diagram with treatments, pointing to where they willbe applied.

Treatment overview diagrams:Use the risk diagrams as a basis, remove the acceptable risks.Add treatments according to the treatment diagram(s).

Page 50: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

50ICT

Treatment diagram

Page 51: Security analysis: CORAS in seven steps...CORAS. ICT 3 Step 1: Introduction The first step involves an introductory meeting. The main item on the agenda for this meeting is to get

51ICT

Treatment overview diagram